Graph-theoretic defense mechanisms against false data injection attacks in smart grids

被引:7
作者
Mohammad Hasan ANSARI [1 ,2 ]
Vahid Tabataba VAKILI [1 ,2 ]
Behnam BAHRAK [1 ,2 ]
Parmiss TAVASSOLI [1 ,2 ]
机构
[1] Electrical Engineering Department, Iran University of Science and Technology
[2] School of Electrical and Computer Engineering, College of Engineering, University of Tehran
关键词
Smart grids; False data injection; Attack; Minimum Steiner tree problem;
D O I
暂无
中图分类号
TM76 [电力系统的自动化];
学科分类号
080802 ;
摘要
This paper addresses false data injection, which is one of the most significant security challenges in smart grids. Having an accurately estimated state is of great importance for maintaining a stable running condition of smart grids. To preserve the accuracy of the estimated state, bad data detection(BDD) mechanisms are utilized to remove erroneous measurements due to meter failures or outside attacks. In this paper we use a graph-theoretic formulation for false data injection attacks in smart grids and propose defense mechanisms to mitigate this type of attacks. To this end, we discuss characteristics of a typical smart grid graph such as planarity. Then we propose three different approaches to find optimal protected meters set: a fast and efficient heuristic algorithm that works well in practice, an approximation algorithm that provides guarantee for the quality of the protected set, and an exact algorithm that finds the optimal solution. Our extensive simulation results show that our algorithms outperform similar existing solutions in terms of different performance metrics.
引用
收藏
页码:860 / 871
页数:12
相关论文
共 15 条
[1]   An Adaptive Markov Strategy for Defending Smart Grid False Data Injection From Malicious Attackers [J].
Hao, Jianye ;
Kang, Eunsuk ;
Sun, Jun ;
Wang, Zan ;
Meng, Zhaopeng ;
Li, Xiaohong ;
Ming, Zhong .
IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (04) :2398-2408
[2]  
Dijkstra meets Steiner: a fast exact goal-oriented Steiner tree algorithm[J] . Stefan Hougardy,Jannik Silvanus,Jens Vygen.Mathematical Programming Computation . 2017 (2)
[3]   Machine Learning Methods for Attack Detection in the Smart Grid [J].
Ozay, Mete ;
Esnaola, Inaki ;
Vural, Fatos Tunay Yarman ;
Kulkarni, Sanjeev R. ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2016, 27 (08) :1773-1786
[4]   A Real-Time Attack Localization Algorithm for Large Power System Networks Using Graph-Theoretic Techniques [J].
Nudell, Thomas R. ;
Nabavi, Seyedbehzad ;
Chakrabortty, Aranya .
IEEE TRANSACTIONS ON SMART GRID, 2015, 6 (05) :2551-2559
[5]  
Identification of vulnerable node clusters against false data injection attack in an AMI based smart grid[J] . Adnan Anwar,Zahir Tari,Abdun Naser Mahmood.Information Systems . 2014
[6]  
Cyber security in the Smart Grid: Survey and challenges[J] . Wenye Wang,Zhuo Lu.Computer Networks . 2013 (5)
[7]   Steiner Tree Approximation via Iterative Randomized Rounding [J].
Byrka, Jaroslaw ;
Grandoni, Fabrizio ;
Rothvoss, Thomas ;
Sanita, Laura .
JOURNAL OF THE ACM, 2013, 60 (01)
[8]   Malicious Data Attacks on the Smart Grid [J].
Kosut, Oliver ;
Jia, Liyan ;
Thomas, Robert J. ;
Tong, Lang .
IEEE TRANSACTIONS ON SMART GRID, 2011, 2 (04) :645-658
[9]  
A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State Estimator[J] . Teixeira André,Dán Gy?rgy,Sandberg Henrik,Johansson Karl H..IFAC Proceedings Volumes . 2011 (1)
[10]  
Node centrality in weighted networks: Generalizing degree and shortest paths[J] . Tore Opsahl,Filip Agneessens,John Skvoretz.Social Networks . 2010 (3)