kth.sePublications KTH
Operational message
There are currently operational disruptions. Troubleshooting is in progress.
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Network Topology-Aware Mitigation of Undetectable PMU Time Synchronization Attacks
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.ORCID iD: 0000-0002-9988-9545
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.ORCID iD: 0000-0002-4876-0223
2024 (English)In: IEEE Transactions on Control of Network Systems, E-ISSN 2325-5870, Vol. 11, no 4, p. 1899-1910Article in journal (Refereed) Published
Abstract [en]

Time synchronization attacks constitute a major threat to phasor measurement unit-based smart grid applications, and their cost-efficient detection and mitigation is thus of utmost importance. In this article, we propose a mitigation approach based on authenticated network-based time synchronization. Our approach relies on the observation that a time synchronization attack can be undetectable if and only if it targets at least three time references in the power system, and such attacks need to be mitigated through appropriate security controls. We first provide a formal proof of this result, including a characterization of the degrees of freedom of the attacker in constructing an attack. We then formulate the problem of mitigating undetectable attacks at minimum cost as an integer linear program, and prove that it is NP-hard. To solve the problem, we propose two approximation algorithms based on computing shortest paths and solving a linear relaxation of the problem. Extensive simulations suggest the superiority of the proposed algorithms on IEEE benchmark power system graphs compared with baseline solutions. We report mitigation cost savings of at least 76% compared with a naive approach for mitigation and at least 30% compared with the state-of-the-art approach.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE) , 2024. Vol. 11, no 4, p. 1899-1910
Keywords [en]
Phasor measurement units, Synchronization, Voltage measurement, Costs, Power systems, Current measurement, Global Positioning System, Cyber physical systems security, phasor measurement unit, power system state etimation, precision time protocol, time synchronization attack
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
URN: urn:nbn:se:kth:diva-360032DOI: 10.1109/TCNS.2024.3368316ISI: 001413492800001Scopus ID: 2-s2.0-85186109672OAI: oai:DiVA.org:kth-360032DiVA, id: diva2:1938147
Note

QC 20250226

Available from: 2025-02-17 Created: 2025-02-17 Last updated: 2025-02-26Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Shereen, EzzeldinDán, György

Search in DiVA

By author/editor
Shereen, EzzeldinDán, György
By organisation
Network and Systems Engineering
In the same journal
IEEE Transactions on Control of Network Systems
Electrical Engineering, Electronic Engineering, Information Engineering

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 80 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf