DocumentCode
3696447
Title
Implementation of unobservable state-preserving topology attacks
Author
Jiazi Zhang;Lalitha Sankar
Author_Institution
Dept. of Electrical, Computer, and Energy Engineering, Arizona State University, Tempe, 85287, USA
fYear
2015
Firstpage
1
Lastpage
6
Abstract
This paper studies the vulnerability of AC state estimation (SE) with respect to a class of unobservable state-preserving topology attacks, in which the topology data are changed by attacker while the states remain unchanged. An algorithm based on breadth-first search (BFS) is developed to determine the subset of topology data and measurements required to launch successful unobservable state-preserving topology attacks. It is shown that the proposed algorithm can enable an attacker to obtain the localized topology and corresponding measurement data to mount an attack that bypasses bad data detector and successfully changes topology information of the system in the cyber layer.
Keywords
"Computers","Irrigation","Lead"
Publisher
ieee
Conference_Titel
North American Power Symposium (NAPS), 2015
Type
conf
DOI
10.1109/NAPS.2015.7335175
Filename
7335175
Link To Document