Loading…

Can Attackers With Limited Information Exploit Historical Data to Mount Successful False Data Injection Attacks on Power Systems?

This paper studies physical consequences of unobservable false data injection (FDI) attacks designed only with information inside a subnetwork of the power system. The goal of this attack is to overload a chosen target line without being detected via measurements. To overcome the limited information...

Full description

Saved in:
Bibliographic Details
Published in:IEEE transactions on power systems 2018-09, Vol.33 (5), p.4775-4786
Main Authors: Zhang, Jiazi, Chu, Zhigang, Sankar, Lalitha, Kosut, Oliver
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:This paper studies physical consequences of unobservable false data injection (FDI) attacks designed only with information inside a subnetwork of the power system. The goal of this attack is to overload a chosen target line without being detected via measurements. To overcome the limited information, a multiple linear regression model is developed to learn the relationship between the external network and the attack subnetwork from historical data. The worst possible consequences of such FDI attacks are evaluated by solving a bi-level optimization problem wherein the first level models the limited attack resources, while the second level formulates the system response to such attacks via dc optimal power flow (OPF). The attack model with limited information is reflected in the dc OPF formulation that only takes into account the system information for the attack subnetwork. The vulnerability of this attack model is illustrated on the IEEE 24-bus reliability test system and the IEEE 118-bus systems.
ISSN:0885-8950
1558-0679
DOI:10.1109/TPWRS.2018.2818746