Abstract
Coordinated cyberattacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm in the power system state estimation process. These unobservable attacks present a potentially serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacks [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of line power meters is presented. This requires O(n 2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known-secure phasor measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyberattacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyberattacks. © 2011 IEEE.
Original language | English (US) |
---|---|
Title of host publication | 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm) |
Publisher | Institute of Electrical and Electronics Engineers (IEEE) |
Pages | 232-237 |
Number of pages | 6 |
ISBN (Print) | 9781457717024 |
DOIs | |
State | Published - Oct 2011 |
Externally published | Yes |
Bibliographical note
KAUST Repository Item: Exported on 2020-10-01Acknowledged KAUST grant number(s): 025478
Acknowledgements: Supported in part by OOF991-KAUST US LIMITED under awardnumber 025478, the UC Discovery Grant ele07-10283 under theIMPACT program, and NSF under Grant EECS-0925337, the FloridaEnergy Systems Consortium, and Idaho National Labs.
This publication acknowledges KAUST support, but has no KAUST affiliated authors.