Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Distributed Detection and Isolation of Topology Attacks in Power Networks
KTH, School of Electrical Engineering (EES), Automatic Control. KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre.
KTH, School of Electrical Engineering (EES), Automatic Control. KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre.ORCID iD: 0000-0001-9940-5929
2012 (English)In: HiCoNS'12 - Proceedings of the 1st ACM International Conference on High Confidence Networked Systems, Association for Computing Machinery (ACM), 2012, 65-71 p.Conference paper, Published paper (Refereed)
Abstract [en]

This paper addresses the issue of detecting and isolating topology attacks in power networks. A topology attack, unlike a data attack and power injection attack, alters the physical dynamics of the power network by removing bus interconnections. These attacks can manifest as both cyber and physical attacks. A physical topology attack occurs when a bus interconnection is physically broken, while a cyber topology attack occurs when incorrect information about the network topology is transmitted to the system estimator and incorporated as the truth. To detect topology attacks, a stochastic hypothesis testing problem is considered assuming noisy measurements are obtained by periodically sampling a dynamic process described by the networked swing equation dynamics, modified to assume stochastic power injections. A centralized approach to network topology detection and isolation is introduced as a two-part scheme consisting of topology detection followed by topology isolation, assuming a topology attack exists. To address the complexity issues arising with performing centralized detection in large-scale power networks, a decentralized approach is presented that uses only local measurements to detect the presence of a topology attack. Simulation results illustrate that both the centralized and decentralized approaches accurately detect and isolate topology attacks.

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2012. 65-71 p.
Keyword [en]
Distributed hypothesis testing, Distributed fault detection, Power networks
National Category
Computer Science
Identifiers
URN: urn:nbn:se:kth:diva-96746DOI: 10.1145/2185505.2185516ISI: 000304070900008Scopus ID: 2-s2.0-84860619383ISBN: 978-1-4503-1263-9 (print)OAI: oai:DiVA.org:kth-96746DiVA: diva2:533249
Conference
2012 1st ACM International Conference on High Confidence Networked Systems, HiCoNS'12; Beijing; 17 April 2012 through 19 April 2012
Funder
ICT - The Next Generation
Note

QC 20120613

Available from: 2012-06-13 Created: 2012-06-11 Last updated: 2013-09-11Bibliographically approved

Open Access in DiVA

No full text

Other links

Publisher's full textScopus

Authority records BETA

Johansson, Karl Henrik

Search in DiVA

By author/editor
Weimer, JamesJohansson, Karl Henrik
By organisation
Automatic ControlACCESS Linnaeus Centre
Computer Science

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 58 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf