Graph-based Cyber Security Analysis of State Estimation in Smart Power Grid

  title={Graph-based Cyber Security Analysis of State Estimation in Smart Power Grid},
  author={Suzhi Bi and Ying Jun Angela Zhang},
  journal={IEEE Communications Magazine},
  • S. BiY. Zhang
  • Published 18 December 2016
  • Engineering, Computer Science
  • IEEE Communications Magazine
The smart power grid enables intelligent automation at all levels of power system operation, from electricity generation at power plants to power usage in the home. [] Key Result We also highlight several promising future research directions on graph-based security analysis and its applications in smart power grid.

Figures from this paper

A Secured and Authenticated State Estimation Approach to Protect Measurements in Smart Grids

A new architecture to solve the problem of FDI attacks is proposed in this study, conducted on the IEEE 14-bus system and shows a positive performance in terms of minimising the estimation error.

A Bi-Level Model for Detecting and Correcting Parameter Cyber-Attacks in Power System State Estimation

A linear programming method to detect and correct cyber-attacks in the measurement model parameters, built on the classical weighted least squares solution, without hard-to-derive parameters, highlights potential aspects towards real-life applications.

Electric Power Grid Resilience to Cyber Adversaries: State of the Art

This survey discusses such major directions and recent advancements from a lens of different detection techniques, equipment protection plans, and mitigation strategies to enhance the energy delivery infrastructure resilience and operational endurance against cyber attacks.

RL-BAGS: A Tool for Smart Grid Risk Assessment

  • Y. WadhawanC. Neuman
  • Engineering, Computer Science
    2018 International Conference on Smart Grid and Clean Energy Technologies (ICSGCE)
  • 2018
A tool, Reinforcement Learning-Bayesian Attack Graph for Smart Grid System (RLBAGS), which provides functionality to the system engineers to compute optimal policies on regular intervals about whether to SCAN or PATCH a particular function of the smart grid system.

A Survey on Security Communication and Control for Smart Grids Under Malicious Cyber Attacks

A comprehensive security understanding of the SGs framework, attacks scenarios, detection/protection methods, estimation and control strategies from both communication and control viewpoints are addressed.

Smart Grid Cybersecurity: Standards and Technical Countermeasures

This work shows the important areas of future research for academia, and collaboration with government and industry stakeholders to enhance smart grid cybersecurity and make this new paradigm not only beneficial and valuable but also safe and secure.

Analysis and Evaluation of Cyber-attack Impact on Critical Power System Infrastructure

This research uses SUCIF index to compare hacking impact on Ukrainian Power Grid and Saudi Aramco Oil and Gas Company and to legitimize TBCIF score, which has been used to compare the intrusion impact of different IEEE test systems.

T2S2G: A Novel Two-Tier Secure Smart Grid Architecture to Protect Network Measurements

This paper proposes novel two-tier secure smart grid (T2S2G) architecture with distributed SE, which shows promising results in the following performance metrics: Estimation error, number of protected measurements, detection probability, successful detection rate, and detection delay.



False data injection attacks against state estimation in electric power grids

A new class of attacks, called false data injection attacks, against state estimation in electric power grids are presented, showing that an attacker can exploit the configuration of a power system to launch such attacks to successfully introduce arbitrary errors into certain state variables while bypassing existing techniques for bad measurement detection.

Bad data injection in smart grid: attack and defense mechanisms

This article focuses on bad data injection attacks for smart grid, and an adaptive cumulative sum test is able to determine the possible existence of adversaries at the control center as quickly as possible.

Vulnerability Assessment of AC State Estimation With Respect to False Data Injection Cyber-Attacks

New analytical techniques for performing vulnerability analysis of state estimation when it is subject to a hidden false data injection cyber-attack on a power grid's SCADA system are introduced.

Graphical Methods for Defense Against False-Data Injection Attacks on Power System State Estimation

  • S. BiY. Zhang
  • Computer Science
    IEEE Transactions on Smart Grid
  • 2014
This paper uses graphical methods to study defending mechanisms against false-data injection attacks on power system state estimation, and shows that the proposed tree-pruning based approximation algorithm significantly reduces computational complexity, while yielding negligible performance degradation compared with the optimal algorithms.

False data injection attacks with incomplete information against smart power grids

This paper mathematically characterize false data injection attacks with incomplete information from both the attacker's and grid operator's viewpoints and introduces a novel vulnerability measure that can compare and rank different power grid topologies against such attacks.

Defending mechanisms against false-data injection attacks in the power system state estimation

  • S. BiY. Zhang
  • Engineering
    2011 IEEE GLOBECOM Workshops (GC Wkshps)
  • 2011
This paper investigates defending mechanisms against false-data injection attacks and proposes an optimal and reduced-complexity suboptimal algorithm which allows the system operator to protect the state estimates in arbitrary sequence according to their relative importance.

Modeling Load Redistribution Attacks in Power Systems

This is the first work of its kind, which quantitatively analyzes the damage of the false data injection attacks to power system operation and security, and provides an in-depth insight on effective attack prevention with limited protection resource budget.

False-data injection attack to control real-time price in electricity market

  • S. BiY. Zhang
  • Engineering
    2013 IEEE Global Communications Conference (GLOBECOM)
  • 2013
An effective false-data injection attack to control real-time electricity price at any tagged bus is analyzed and a simple algorithm that finds the effective congestion pattern with minor distortion to the normal system operation is proposed.

Using Covert Topological Information for Defense Against Malicious Attacks on DC State Estimation

  • S. BiY. Zhang
  • Computer Science
    IEEE Journal on Selected Areas in Communications
  • 2014
A novel alternative to defend against false data injection attacks using covert power network topological information by keeping the exact reactance of a set of transmission lines from attackers, so that no false data injections can be launched to compromise any set of state variables.

Detecting False Data Injection Attacks on DC State Estimation

It is shown that it is necessary and sufficient to protect a set of basic measurements to detect false data injection attacks in state estimation and by having a way to independently verify or measure the values of a strategically selected set of state variables.