Skip to main content
Top

2018 | OriginalPaper | Chapter

2. A Review on Attacks and Their Countermeasures in Power System State Estimation

Authors : Ammara Gul, Stephen D. Wolthusen

Published in: Smart Micro-Grid Systems Security and Privacy

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this chapter we seek to provide an integrated, up-to-date survey of various attack models and corresponding protection regarding state estimation in larger-scale power systems. After giving brief overview of numerous attack and defence strategies in literature, the most appropriate between them are reported, explored and compared. Comparisons are performed on account of complexity level, optimality, considered structure, topology knowledge requirements and practical implementation along with the impact of advanced metering devices.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference A. Abur, A. G. Exposito: In: Power System State Estimation: Theory and Implementation. CRC Press - Taylor Francis Group ISBN: 9780824755706 Textbook - 327 Pages (March 2004) A. Abur, A. G. Exposito: In: Power System State Estimation: Theory and Implementation. CRC Press - Taylor Francis Group ISBN: 9780824755706 Textbook - 327 Pages (March 2004)
2.
go back to reference Y. Liu, P. Ning, M. K. Reiter: False data injection attacks against state estimation in electric power grids. In: Proceedings of 16th ACM conference on Computer and communications security, NY, USA (November 2009) 21–32 Y. Liu, P. Ning, M. K. Reiter: False data injection attacks against state estimation in electric power grids. In: Proceedings of 16th ACM conference on Computer and communications security, NY, USA (November 2009) 21–32
3.
go back to reference J. Kim, L. Tong, R. J. Thomas: Data Framing Attack on State Estimation. IEEE Journal on Selected Areas in Communications 32 (2014) J. Kim, L. Tong, R. J. Thomas: Data Framing Attack on State Estimation. IEEE Journal on Selected Areas in Communications 32 (2014)
4.
go back to reference M. Ahmed, Technology and Engineering. In: Power System State Estimation. Artech House (January 2013) M. Ahmed, Technology and Engineering. In: Power System State Estimation. Artech House (January 2013)
5.
go back to reference A. Baiocco, S. Wolthusen: Stability of Power Network State Estimation under Attack. In: Proceedings of 2014 IEEE Innovative Smart Grid Technologies - Asia (ISGT ASIA), Kuala Lumpur (May 2014) 441–446 A. Baiocco, S. Wolthusen: Stability of Power Network State Estimation under Attack. In: Proceedings of 2014 IEEE Innovative Smart Grid Technologies - Asia (ISGT ASIA), Kuala Lumpur (May 2014) 441–446
6.
go back to reference A. Gomez-Exposito, A. Abur, A. de la Villa Jaen, C. Gomez-Quiles: A Multi Level State Estimation Paradigm for Smart Grids. Proceedings of the IEEE 99 (April 2011) 952–976CrossRef A. Gomez-Exposito, A. Abur, A. de la Villa Jaen, C. Gomez-Quiles: A Multi Level State Estimation Paradigm for Smart Grids. Proceedings of the IEEE 99 (April 2011) 952–976CrossRef
7.
go back to reference A. Monticellii: Business and Economics. In: State Estimation in Electric Power System: A generalized approach. Springer Science and Business Media (May 1999) A. Monticellii: Business and Economics. In: State Estimation in Electric Power System: A generalized approach. Springer Science and Business Media (May 1999)
8.
go back to reference D. P. Shepard, T. E. Humphreys: Evaluation of the Vulnerability of Phasor Measurement Units to GPS Spoofing Attacks. In: Sixth annual IFIP Conference on Critical Infrastructure Protection. Volume 5., Washington DC (December 2012) D. P. Shepard, T. E. Humphreys: Evaluation of the Vulnerability of Phasor Measurement Units to GPS Spoofing Attacks. In: Sixth annual IFIP Conference on Critical Infrastructure Protection. Volume 5., Washington DC (December 2012)
9.
go back to reference A. Baiocco, C. Foglietta, S. D. Wolthusen: Delay and Jitter Attacks on Hierarchical State Estimation. In: Proceedings of 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm), Miami, FL, IEEE (November 2015) 485–490 A. Baiocco, C. Foglietta, S. D. Wolthusen: Delay and Jitter Attacks on Hierarchical State Estimation. In: Proceedings of 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm), Miami, FL, IEEE (November 2015) 485–490
10.
go back to reference R. B. D. Deka, S. Vishwanath: Optimal Data Attack on Power Grid: Leveraging Detection and Measurement Jamming. In: Proceedings of the 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm), Miami, FL, IEEE (November 2015) 392–397 R. B. D. Deka, S. Vishwanath: Optimal Data Attack on Power Grid: Leveraging Detection and Measurement Jamming. In: Proceedings of the 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm), Miami, FL, IEEE (November 2015) 392–397
11.
go back to reference T. T. Kim, H. V. Poor: Strategic Protection Against Data Injection Attacks on Power Grids. IEEE Transactions on Smart Grid 2 (June 2011) 326–333CrossRef T. T. Kim, H. V. Poor: Strategic Protection Against Data Injection Attacks on Power Grids. IEEE Transactions on Smart Grid 2 (June 2011) 326–333CrossRef
12.
go back to reference A. T. H. Sandberg, K. H. Johanasson: On Security Indices for State Estimators in Power Networks. In: Preprints of the First Workshop on Secure Control Systems CPSWEEK 2010, Stockholm (2010) A. T. H. Sandberg, K. H. Johanasson: On Security Indices for State Estimators in Power Networks. In: Preprints of the First Workshop on Secure Control Systems CPSWEEK 2010, Stockholm (2010)
13.
go back to reference R. B. Bobba, K. Rogers, Q. Wang, H. Khurana, K. Nahrstedt, T. J. Overbye: Detecting false data injection attacks on DC state estimation. In: Proceedings of First Workshop on Secure Control Systems (SCS 2010), Stockholm, Sweden (April 2010) R. B. Bobba, K. Rogers, Q. Wang, H. Khurana, K. Nahrstedt, T. J. Overbye: Detecting false data injection attacks on DC state estimation. In: Proceedings of First Workshop on Secure Control Systems (SCS 2010), Stockholm, Sweden (April 2010)
14.
go back to reference S. Bi, Y. J. Zhang: Defending mechanisms against false data injection attacks in the power system state estimation. (December 2011) S. Bi, Y. J. Zhang: Defending mechanisms against false data injection attacks in the power system state estimation. (December 2011)
15.
go back to reference G. Dan, H. Sandberg: Stealth Attacks and Protection Schemes for State Estimators in Power Systems. In: Proceedings of the 2010 first IEEE Smart Grid Communication, Gaithersburg, MD (October 2010) 214–219 G. Dan, H. Sandberg: Stealth Attacks and Protection Schemes for State Estimators in Power Systems. In: Proceedings of the 2010 first IEEE Smart Grid Communication, Gaithersburg, MD (October 2010) 214–219
16.
go back to reference A. Giani, E. Bitar, M. Garcia, M. McQueen, P. Khargonekar., K. Poolla: Smart grid data integrity attacks: characterizations and countermeasures. (October 2011) A. Giani, E. Bitar, M. Garcia, M. McQueen, P. Khargonekar., K. Poolla: Smart grid data integrity attacks: characterizations and countermeasures. (October 2011)
17.
go back to reference Y. Feng, C. Foglietta, A. Baiocco, S. Panzieri, S. D. Wolthusen: Malicious False Data Injection in Heirarchical Electric Power Grid State Estimation Systems. (May 2013) Y. Feng, C. Foglietta, A. Baiocco, S. Panzieri, S. D. Wolthusen: Malicious False Data Injection in Heirarchical Electric Power Grid State Estimation Systems. (May 2013)
18.
go back to reference O. Vukovic, G. Dan: On the Security of Distributed Power System State Estimation under Targeted Attacks. (March 2013) O. Vukovic, G. Dan: On the Security of Distributed Power System State Estimation under Targeted Attacks. (March 2013)
19.
go back to reference O. Vukovic, G. Dan: Security of Fully Distributed Power System State Estimation: Detection and Mitigation of Data Integrity Attacks. IEEE Journal on Selected Area Communication (July 2014) O. Vukovic, G. Dan: Security of Fully Distributed Power System State Estimation: Detection and Mitigation of Data Integrity Attacks. IEEE Journal on Selected Area Communication (July 2014)
20.
go back to reference A. Gul, S. D. Wolthusen: Measurement Re-Ordering Attacks on Power System State Estimation. (2017, Accepted in 7th IEEE International Conference on Innovative Smart Grid Technologies (ISGT), Europe) A. Gul, S. D. Wolthusen: Measurement Re-Ordering Attacks on Power System State Estimation. (2017, Accepted in 7th IEEE International Conference on Innovative Smart Grid Technologies (ISGT), Europe)
21.
go back to reference J. Kim, L. Tong, R. Thomas: Subspace Methods for Data Attack on State Estimation: A Data Driven Approach. (March 2015)MATH J. Kim, L. Tong, R. Thomas: Subspace Methods for Data Attack on State Estimation: A Data Driven Approach. (March 2015)MATH
22.
go back to reference D. Deka, R. Baldick., S. Vishwanath: Data Attacks on Power Grids: Leveraging Detection, IEEE (February 2015) D. Deka, R. Baldick., S. Vishwanath: Data Attacks on Power Grids: Leveraging Detection, IEEE (February 2015)
23.
go back to reference A. Sanjab, W. Saad: Smart Grid Data Injection Attacks: To Defend or Not? In: Proceedings of the 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm), Miami, FL, IEEE (November 2015) 380–385 A. Sanjab, W. Saad: Smart Grid Data Injection Attacks: To Defend or Not? In: Proceedings of the 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm), Miami, FL, IEEE (November 2015) 380–385
24.
go back to reference A. Sanjab, W. Saad: Data Injection Attacks on Smart Grids with Multiple Adversaries: A Game-Theoretic Perspective. Number 99 (April 2016) A. Sanjab, W. Saad: Data Injection Attacks on Smart Grids with Multiple Adversaries: A Game-Theoretic Perspective. Number 99 (April 2016)
25.
go back to reference K. Zetter: Inside the Cunning, Unprecedented Hack of Ukrain’s Power Grid. Critical Infrastructures (March 2016) K. Zetter: Inside the Cunning, Unprecedented Hack of Ukrain’s Power Grid. Critical Infrastructures (March 2016)
Metadata
Title
A Review on Attacks and Their Countermeasures in Power System State Estimation
Authors
Ammara Gul
Stephen D. Wolthusen
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-91427-5_2

Premium Partner