Modeling and performance evaluation of stealthy false data injection attacks on smart grid in the presence of corrupted measurements
Version 2 2024-06-05, 04:13Version 2 2024-06-05, 04:13
Version 1 2019-06-26, 14:13Version 1 2019-06-26, 14:13
journal contribution
posted on 2024-06-05, 04:13 authored by Adnan AnwarAdnan Anwar, AN Mahmood, M Pickering© 2016 Elsevier Inc. The false data injection (FDI) attack cannot be detected by the traditional anomaly detection techniques used in the energy system state estimators. In this paper, we demonstrate how FDI attacks can be constructed blindly, i.e., without system knowledge; including topological connectivity and line reactance information. Our analysis reveals that existing FDI attacks become detectable (consequently unsuccessful) by the state estimator if the data contains grossly corrupted measurements such as device malfunction and communication errors. The proposed sparse optimization based stealthy attacks construction strategy overcomes this limitation by separating the gross errors from the measurement matrix. Extensive theoretical modeling and experimental evaluation show that the proposed technique performs more stealthily (has less relative error) and efficiently (fast enough to maintain time requirement) compared to other methods on IEEE benchmark test systems.
History
Journal
Journal of computer and system sciencesVolume
83Pagination
58-72Location
Amsterdam, The NetherlandsPublisher DOI
Open access
- Yes
Link to full text
ISSN
0022-0000eISSN
1090-2724Language
engPublication classification
C1.1 Refereed article in a scholarly journalCopyright notice
2016, Elsevier Inc.Issue
1Publisher
ElsevierUsage metrics
Categories
Licence
Exports
RefWorksRefWorks
BibTeXBibTeX
Ref. managerRef. manager
EndnoteEndnote
DataCiteDataCite
NLMNLM
DCDC