{"title":"Cyber attacks, detection and protection in smart grid state estimation","authors":"Yi Zhou, Zhixin Miao","doi":"10.1109/NAPS.2016.7747874","DOIUrl":null,"url":null,"abstract":"This paper reviews the types of cyber attacks in state estimation as well as detection and protection schemes. Recent studies show that adversaries can not only generate attack vectors, which can bypass the conventional detector, but can also optimize the attack vector to compromise least number of sensors. We examined four types of attack in state estimation process. Then, we examined least effort false data injection attack on how to find the optimal attack vector. Based on the analysis, we implement χ2 detector and Euclidean distance detector to detect attacks. We propose an effective way to protect power system sensors. The case studies are based on a 5-bus system and IEEE-14 bus system. It shows that least effort attack can make most significant deviation of state estimation by compromising least number of sensors. χ2 detector can detect random data injection, bad data injection and DoS attack. However, false data injection can bypass conventional statistical detector, such as χ2 detector. Euclidean distance detector can detect false data injection.","PeriodicalId":249041,"journal":{"name":"2016 North American Power Symposium (NAPS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 North American Power Symposium (NAPS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NAPS.2016.7747874","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 15
Abstract
This paper reviews the types of cyber attacks in state estimation as well as detection and protection schemes. Recent studies show that adversaries can not only generate attack vectors, which can bypass the conventional detector, but can also optimize the attack vector to compromise least number of sensors. We examined four types of attack in state estimation process. Then, we examined least effort false data injection attack on how to find the optimal attack vector. Based on the analysis, we implement χ2 detector and Euclidean distance detector to detect attacks. We propose an effective way to protect power system sensors. The case studies are based on a 5-bus system and IEEE-14 bus system. It shows that least effort attack can make most significant deviation of state estimation by compromising least number of sensors. χ2 detector can detect random data injection, bad data injection and DoS attack. However, false data injection can bypass conventional statistical detector, such as χ2 detector. Euclidean distance detector can detect false data injection.