Graph-Theoretic Framework for Unified Analysis of Observability and Data Injection Attacks in the Smart Grid

01/26/2018
by   Anibal Sanjab, et al.
0

In this paper, a novel graph-theoretic framework is proposed to generalize the analysis of a broad set of security attacks, including observability and data injection attacks, that target the smart grid. First, the notion of observability attacks is defined based on a proposed graph-theoretic construct. In this respect, an algorithm is proposed to characterize the critical set of measurements which must be removed along with a certain measurement to make the system unobservable. It is then shown that for the system to be observable these critical sets must be part of a maximum matching over a proposed bipartite graph. In addition, it is shown that stealthy data injection attacks are a special case of these observability attacks. Then, various attack strategies and defense policies for observability and data injection attacks are shown to be amenable to analysis using variations of the formulated maximum-matching problem. The proposed framework is then shown to provide a unified basis for exact analysis of four security problems (among others), pertaining to the characterization of: 1) The sparsest stealthy attack, 2) The sparsest stealthy attack including a certain specific measurement, 3) A set of measurements which must be defended to thwart all potential stealthy attacks, and 4) The set of measurements, which when protected, can thwart any attack whose cardinality is below a certain threshold. A case study using the IEEE 14-bus system containing a set of 17 measurement units is used to corroborate the theoretical findings. In this case analysis, stealthy attacks of lowest cardinality are characterized and shown to have a cardinality equal to 2. In addition, it is shown that defending only 3 out of the 17 measurements is enough to thwart any stealthy attack with cardinality lower than 3, while defending a minimum of 13 measurements is needed to thwart all possible stealthy attacks.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/03/2018

Dynamic Detection of False Data Injection Attack in Smart Grid using Deep Learning

Modern advances in sensor, computing, and communication technologies ena...
research
02/06/2020

Data-Driven False Data Injection Attacks Against Power Grid: A Random Matrix Approach

We address the problem of constructing false data injection (FDI) attack...
research
03/11/2020

Designing constraint-based False Data Injection attacks for unbalanced distribution smart grids

Smart grid is equipped with various kinds of smart devices such as meter...
research
04/03/2020

Man in the middle and current injection attacks against the KLJN key exchanger compromised by DC sources

This study addresses a new question regarding the security of the Kirchh...
research
12/22/2021

Asymptotic Learning Requirements for Stealth Attacks

Information-theoretic stealth attacks are data injection attacks that mi...
research
11/03/2019

Novel Attacks against Contingency Analysis in Power Grids

Contingency Analysis (CA) is a core component of the Energy Management S...
research
04/27/2023

SHATTER: Control and Defense-Aware Attack Analytics for Activity-Driven Smart Home Systems

Modern smart home control systems utilize real-time occupancy and activi...

Please sign up or login with your details

Forgot password? Click here to reset