• DocumentCode
    3696447
  • Title

    Implementation of unobservable state-preserving topology attacks

  • Author

    Jiazi Zhang;Lalitha Sankar

  • Author_Institution
    Dept. of Electrical, Computer, and Energy Engineering, Arizona State University, Tempe, 85287, USA
  • fYear
    2015
  • Firstpage
    1
  • Lastpage
    6
  • Abstract
    This paper studies the vulnerability of AC state estimation (SE) with respect to a class of unobservable state-preserving topology attacks, in which the topology data are changed by attacker while the states remain unchanged. An algorithm based on breadth-first search (BFS) is developed to determine the subset of topology data and measurements required to launch successful unobservable state-preserving topology attacks. It is shown that the proposed algorithm can enable an attacker to obtain the localized topology and corresponding measurement data to mount an attack that bypasses bad data detector and successfully changes topology information of the system in the cyber layer.
  • Keywords
    "Computers","Irrigation","Lead"
  • Publisher
    ieee
  • Conference_Titel
    North American Power Symposium (NAPS), 2015
  • Type

    conf

  • DOI
    10.1109/NAPS.2015.7335175
  • Filename
    7335175