DocumentCode :
3696447
Title :
Implementation of unobservable state-preserving topology attacks
Author :
Jiazi Zhang;Lalitha Sankar
Author_Institution :
Dept. of Electrical, Computer, and Energy Engineering, Arizona State University, Tempe, 85287, USA
fYear :
2015
Firstpage :
1
Lastpage :
6
Abstract :
This paper studies the vulnerability of AC state estimation (SE) with respect to a class of unobservable state-preserving topology attacks, in which the topology data are changed by attacker while the states remain unchanged. An algorithm based on breadth-first search (BFS) is developed to determine the subset of topology data and measurements required to launch successful unobservable state-preserving topology attacks. It is shown that the proposed algorithm can enable an attacker to obtain the localized topology and corresponding measurement data to mount an attack that bypasses bad data detector and successfully changes topology information of the system in the cyber layer.
Keywords :
"Computers","Irrigation","Lead"
Publisher :
ieee
Conference_Titel :
North American Power Symposium (NAPS), 2015
Type :
conf
DOI :
10.1109/NAPS.2015.7335175
Filename :
7335175
Link To Document :
بازگشت