{"title":"Data attack on strategic buses in the power grid: Design and protection","authors":"Deepjyoti Deka, R. Baldick, S. Vishwanath","doi":"10.1109/PESGM.2014.6939058","DOIUrl":null,"url":null,"abstract":"Malicious data attacks on specific buses of the power grid can lead to incorrect state estimation and in turn affect electricity prices and operational stability. A hidden data attack model is presented in this paper which involves an adversary corrupting meter readings in the grid to produce undetectable errors in a set of critical state variables. A polynomial time algorithm is given to identify the minimum set of measurements needed by the adversary to corrupt the desired state variables. To prevent such hidden attacks, a greedy protection algorithm is proposed for two cases, one where the adversary is resource limited and the other where the adversary has no resource constraint. The performances of the proposed algorithms are demonstrated through simulations on different IEEE test systems.","PeriodicalId":149134,"journal":{"name":"2014 IEEE PES General Meeting | Conference & Exposition","volume":"21 6","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"18","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE PES General Meeting | Conference & Exposition","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PESGM.2014.6939058","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 18
Abstract
Malicious data attacks on specific buses of the power grid can lead to incorrect state estimation and in turn affect electricity prices and operational stability. A hidden data attack model is presented in this paper which involves an adversary corrupting meter readings in the grid to produce undetectable errors in a set of critical state variables. A polynomial time algorithm is given to identify the minimum set of measurements needed by the adversary to corrupt the desired state variables. To prevent such hidden attacks, a greedy protection algorithm is proposed for two cases, one where the adversary is resource limited and the other where the adversary has no resource constraint. The performances of the proposed algorithms are demonstrated through simulations on different IEEE test systems.