kth.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
On Security Indices for State Estimators in Power Networks
KTH, School of Electrical Engineering (EES), Automatic Control. KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre.ORCID iD: 0000-0003-1835-2963
KTH, School of Electrical Engineering (EES), Automatic Control. KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre.ORCID iD: 0000-0001-5491-4068
KTH, School of Electrical Engineering (EES), Automatic Control. KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre.ORCID iD: 0000-0001-9940-5929
2010 (English)In: Preprints of the First Workshop on Secure Control Systems, CPSWEEK 2010,  Stockholm, Sweden, 2010Conference paper, Published paper (Refereed)
Abstract [en]

In this paper, we study stealthy false-data attacksagainst state estimators in power networks. The focus ison applications in SCADA (Supervisory Control and DataAcquisition) systems where measurement data is corrupted bya malicious attacker. We introduce two security indices for thestate estimators. The indices quantify the least effort neededto achieve attack goals while avoiding bad-data alarms in thepower network control center (stealthy attacks). The indicesdepend on the physical topology of the power network and theavailable measurements, and can help the system operator toidentify sparse data manipulation patterns. This informationcan be used to strengthen the security by allocating encryptiondevices, for example. The analysis is also complemented witha convex optimization framework that can be used to evaluatemore complex attacks taking model deviations and multipleattack goals into account. The security indices are finallycomputed in an example. It is seen that a large measurementredundancy forces the attacker to use large magnitudes in thedata manipulation pattern, but that the pattern still can be relatively sparse.

Place, publisher, year, edition, pages
2010.
National Category
Control Engineering
Identifiers
URN: urn:nbn:se:kth:diva-74481OAI: oai:DiVA.org:kth-74481DiVA, id: diva2:489697
Conference
First Workshop on Secure Control Systems (SCS), Stockholm, 2010
Note
QC 20120206Available from: 2012-02-06 Created: 2012-02-03 Last updated: 2024-03-18Bibliographically approved

Open Access in DiVA

fulltext(183 kB)2673 downloads
File information
File name FULLTEXT01.pdfFile size 183 kBChecksum SHA-512
665741381a71d345162a96a478c42f7742db2e88d0fb79798dee760a1d62442df30103a825b52e172f238ddc49f623437dbea121799d8545ef9fdbd6a609aaf6
Type fulltextMimetype application/pdf

Other links

Conference website

Authority records

Sandberg, HenrikTeixeira, AndréJohansson, K. H.

Search in DiVA

By author/editor
Sandberg, HenrikTeixeira, AndréJohansson, K. H.
By organisation
Automatic ControlACCESS Linnaeus Centre
Control Engineering

Search outside of DiVA

GoogleGoogle Scholar
Total: 2673 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 5000 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf