DocumentCode :
114253
Title :
Stealthy attacks in power systems: Limitations on manipulating the estimation deviations caused by switching network topologies
Author :
Shaocheng Wang ; Wei Ren
Author_Institution :
Univ. of California, Riverside, Riverside, CA, USA
fYear :
2014
fDate :
15-17 Dec. 2014
Firstpage :
217
Lastpage :
222
Abstract :
The reliability and robustness of the power system have gained increasing attention as the trend of including more information infrastructures into the current power grid. The stealthy attack is a kind of cyber attack that is undetectable to any residue-based detection scheme. Our previous work [1] has shown that the existence of such attacks can be eliminated by rotationally switching off one of some preselected links which contain a spanning tree of the network graph. In this paper, we extend our previous work, to consider the case when the attack is only stealthy in some of the topologies. The possible consistent deviations of the estimated states are formulated. We show that as the attack is stealthy in more topologies, the flexibility of such deviations is linearly decreased. Several cases are studied to show this trade-off.
Keywords :
network theory (graphs); power engineering computing; power grids; power system protection; power system reliability; security of data; switching networks; telecommunication network topology; cyber attack; network graph; power grid; power system reliability; power system robustness; power system stealthy attack; residue-based detection scheme; spanning tree; switching network topology; Artificial intelligence; Estimation; Network topology; Power transmission lines; Topology; Transmission line matrix methods; Transmission line measurements;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Decision and Control (CDC), 2014 IEEE 53rd Annual Conference on
Conference_Location :
Los Angeles, CA
Print_ISBN :
978-1-4799-7746-8
Type :
conf
DOI :
10.1109/CDC.2014.7039384
Filename :
7039384
Link To Document :
بازگشت