Network-Aware Mitigation of Data Integrity Attacks on Power System State Estimation
2012 (English)In: IEEE Journal on Selected Areas in Communications, ISSN 0733-8716, E-ISSN 1558-0008, Vol. 30, no 6, 1108-1118 p.Article in journal (Refereed) Published
Critical power system applications like contingency analysis and optimal power flow calculation rely on the power system state estimator. Hence the security of the state estimator is essential for the proper operation of the power system. In the future more applications are expected to rely on it, so that its importance will increase. Based on realistic models of the communication infrastructure used to deliver measurement data from the substations to the state estimator, in this paper we investigate the vulnerability of the power system state estimator to attacks performed against the communication infrastructure. We define security metrics that quantify the importance of individual substations and the cost of attacking individual measurements. We propose approximations of these metrics, that are based on the communication network topology only, and we compare them to the exact metrics. We provide efficient algorithms to calculate the security metrics. We use the metrics to show how various network layer and application layer mitigation strategies, like single and multi-path routing and data authentication, can be used to decrease the vulnerability of the state estimator. We illustrate the efficiency of the algorithms on the IEEE 118 and 300 bus benchmark power systems.
Place, publisher, year, edition, pages
2012. Vol. 30, no 6, 1108-1118 p.
SCADA communication, state estimation, cyber-physical security
Research subject SRA - ICT
IdentifiersURN: urn:nbn:se:kth:diva-92610DOI: 10.1109/JSAC.2012.120709ISI: 000305984500009ScopusID: 2-s2.0-84863506343OAI: oai:DiVA.org:kth-92610DiVA: diva2:513940
ProjectsEU FP7 VikingACCESS
FunderEU, FP7, Seventh Framework ProgrammeICT - The Next Generation
QC 201409242012-04-042012-04-042014-09-24Bibliographically approved