Survey of false data injection attacks in power transmission systems

被引:0
|
作者
Wang X. [1 ]
Tian M. [1 ]
Dong Z. [2 ]
Zhu G. [1 ]
Long J. [1 ]
Dai D. [1 ]
Zhang Q. [3 ]
机构
[1] Electronic Information School, Wuhan University, Wuhan, 430072, Hubei Province
[2] School of Power and Mechanical Engineering, Wuhan University, Wuhan, 430072, Hubei Province
[3] College of Mathematics and Computer, Hubei University of Art and Science, Xiangyang, 441053, Hubei Province
来源
Dianwang Jishu | / 11卷 / 3406-3414期
基金
中国国家自然科学基金;
关键词
False data injection attacks; Information security; L[!sub]0[!/sub]-norm; Residue; State estimation;
D O I
10.13335/j.1000-3673.pst.2016.11.019
中图分类号
学科分类号
摘要
False data injection attacks (FDIAs) take advantage of flaws of bad data detection in transmission system state estimate based on residue. By injecting false data to supervisory control and data acquisition(SCADA) system, FDIAs attackers can achieve some illegal goals, such as modifying measurements and state variables, controlling operations, gaining profits, etc. Fundamental theories and implementation mechanism of FDIAs were illustrated. State-of-arts of FDIAs were teased out from perspective of attack strategies and countermeasures, information integrity of power systems, extended attacking methods of FDIAs and optimization of attacking vectors. Advantages and disadvantages of different research results were also analyzed. Effects of FDIAs on distributed state estimation, FDIAs in hybrid SCADA/PMU measurements and countermeasures based on multi-agent were prospected. © 2016, Power System Technology Press. All right reserved.
引用
收藏
页码:3406 / 3414
页数:8
相关论文
共 66 条
  • [51] Esmalifalak M., Shi G., Han Z., Et al., Bad data injection attack and defense in electricity market using game theory study, IEEE Transactions on Smart Grid, 4, 1, pp. 160-169, (2013)
  • [52] Sou K.C., Sandberg H., Johansson K.H., Computing critical K-tuples in power networks, IEEE Transactions on Power Systems, 27, 3, pp. 1511-1520, (2012)
  • [53] Sou K.C., Sandberg H., Johansson K.H., On the exact solution to a smart grid cyber-security analysis problem, IEEE Transactions on Smart Grid, 4, 2, pp. 856-865, (2013)
  • [54] Li Y., Wang Z., Wang J., Et al., Sparse signal reconstruction based on l0 norm approximation minimization, Computer Engineering and Applications, 51, 10, pp. 200-204, (2015)
  • [55] Hao J., Piechocki R., Kaleshi D., Et al., Sparse malicious false data injection attacks and defense mechanisms in smart grids, IEEE Transactions on Industrial Informatics, 11, 5, pp. 1198-1209, (2015)
  • [56] Candes E.J., Tao T., Decoding by linear programming, IEEE Transactions on Information Theory, 51, 12, pp. 4203-4215, (2005)
  • [57] Kekatos V., Giannakis G., Distributed robust power system state estimation, IEEE Transactions on Power Systems, 28, 2, pp. 1617-1626, (2013)
  • [58] Ma P., Shen C., Chen Y., Et al., Distributed state estimation based on the pseudo-measurement coordination variables, Proceedings of the CSEE, 34, 19, pp. 3170-3177, (2014)
  • [59] Gomez-Exposito A., De la Villa Jaen A., Gomez-Quiles C., Et al., A taxonomy of multi-area state estimation methods, Electric Power Systems Research, 81, 4, pp. 1060-1069, (2011)
  • [60] Ozay M., Esnaola I., Vural F.T., Et al., Sparse attack construction and state estimation in the smart grid: centralized and distributed models, IEEE Journal on Selected Areas in Communications, 31, 7, pp. 1306-1318, (2013)