kth.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Cyber security analysis of state estimators in electric power systems
KTH, School of Electrical Engineering (EES), Automatic Control. KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre.ORCID iD: 0000-0001-5491-4068
KTH, School of Electrical Engineering (EES), Automatic Control. KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre.ORCID iD: 0000-0003-1835-2963
KTH, School of Electrical Engineering (EES), Automatic Control. KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre.ORCID iD: 0000-0001-9940-5929
Show others and affiliations
2010 (English)In: 49TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2010, p. 5991-5998Conference paper, Published paper (Refereed)
Abstract [en]

In this paper, we analyze the cyber security of state estimators in Supervisory Control and Data Acquisition (SCADA) systems operating in power grids. Safe and reliable operation of these critical infrastructure systems is a major concern in our society. In current state estimation algorithms there are bad data detection (BDD) schemes to detect random outliers in the measurement data. Such schemes are based on high measurement redundancy. Although such methods may detect a set of very basic cyber attacks, they may fail in the presence of a more intelligent attacker. We explore the latter by considering scenarios where deception attacks are performed, sending false information to the control center. Similar attacks have been studied before for linear state estimators, assuming the attacker has perfect model knowledge. Here we instead assume the attacker only possesses a perturbed model. Such a model may correspond to a partial model of the true system, or even an out-dated model. We characterize the attacker by a set of objectives, and propose policies to synthesize stealthy deceptions attacks, both in the case of linear and nonlinear estimators. We show that the more accurate model the attacker has access to, the larger deception attack he can perform undetected. Specifically, we quantify trade-offs between model accuracy and possible attack impact for different BDD schemes. The developed tools can be used to further strengthen and protect the critical state-estimation component in SCADA systems.

Place, publisher, year, edition, pages
2010. p. 5991-5998
Keywords [en]
BDD scheme;SCADA system;bad data detection;critical infrastructure system;critical state-estimation component;cyber attack;cyber security analysis;deception attack;electric power system;intelligent attacker;linear state estimator;measurement redundancy;nonlinear estimator;power grid;random outlier detection;reliable operation;safe operation;supervisory control and data acquisition system;SCADA systems;nonlinear estimation;power engineering computing;power grids;power system control;power system reliability;power system security;security of data;state estimation;
National Category
Control Engineering
Identifiers
URN: urn:nbn:se:kth:diva-74472DOI: 10.1109/CDC.2010.5717318ISI: 000295049106123Scopus ID: 2-s2.0-79953131246OAI: oai:DiVA.org:kth-74472DiVA, id: diva2:489686
Conference
49th IEEE Conference on Decision and Control (CDC). Atlanta, GA. DEC 15-17, 2010
Note
QC 20120203Available from: 2012-02-03 Created: 2012-02-03 Last updated: 2024-03-18Bibliographically approved

Open Access in DiVA

secure_cdc10(259 kB)4678 downloads
File information
File name FULLTEXT01.pdfFile size 259 kBChecksum SHA-512
cb29193e35e7dda7654fd147014e5c7926201a865e30d082948c7b3bb02a6a0006fb293feeef25534219e04810e48544f11066039221bfd1ce53cb5946d178db
Type fulltextMimetype application/pdf

Other links

Publisher's full textScopus

Authority records

Teixeira, AndréSandberg, HenrikJohansson, Karl Henrik

Search in DiVA

By author/editor
Teixeira, AndréSandberg, HenrikJohansson, Karl Henrik
By organisation
Automatic ControlACCESS Linnaeus Centre
Control Engineering

Search outside of DiVA

GoogleGoogle Scholar
Total: 4680 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 2240 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf