DocumentCode
114253
Title
Stealthy attacks in power systems: Limitations on manipulating the estimation deviations caused by switching network topologies
Author
Shaocheng Wang ; Wei Ren
Author_Institution
Univ. of California, Riverside, Riverside, CA, USA
fYear
2014
fDate
15-17 Dec. 2014
Firstpage
217
Lastpage
222
Abstract
The reliability and robustness of the power system have gained increasing attention as the trend of including more information infrastructures into the current power grid. The stealthy attack is a kind of cyber attack that is undetectable to any residue-based detection scheme. Our previous work [1] has shown that the existence of such attacks can be eliminated by rotationally switching off one of some preselected links which contain a spanning tree of the network graph. In this paper, we extend our previous work, to consider the case when the attack is only stealthy in some of the topologies. The possible consistent deviations of the estimated states are formulated. We show that as the attack is stealthy in more topologies, the flexibility of such deviations is linearly decreased. Several cases are studied to show this trade-off.
Keywords
network theory (graphs); power engineering computing; power grids; power system protection; power system reliability; security of data; switching networks; telecommunication network topology; cyber attack; network graph; power grid; power system reliability; power system robustness; power system stealthy attack; residue-based detection scheme; spanning tree; switching network topology; Artificial intelligence; Estimation; Network topology; Power transmission lines; Topology; Transmission line matrix methods; Transmission line measurements;
fLanguage
English
Publisher
ieee
Conference_Titel
Decision and Control (CDC), 2014 IEEE 53rd Annual Conference on
Conference_Location
Los Angeles, CA
Print_ISBN
978-1-4799-7746-8
Type
conf
DOI
10.1109/CDC.2014.7039384
Filename
7039384
Link To Document