Endre søk
RefereraExporteraLink to record
Permanent link

Direct link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Network Topology-Aware Mitigation of Undetectable PMU Time Synchronization Attacks
KTH, Skolan för elektroteknik och datavetenskap (EECS), Datavetenskap, Nätverk och systemteknik.ORCID-id: 0000-0002-9988-9545
KTH, Skolan för elektroteknik och datavetenskap (EECS), Datavetenskap, Nätverk och systemteknik.ORCID-id: 0000-0002-4876-0223
2024 (engelsk)Inngår i: IEEE Transactions on Control of Network Systems, E-ISSN 2325-5870, Vol. 11, nr 4, s. 1899-1910Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

Time synchronization attacks constitute a major threat to phasor measurement unit-based smart grid applications, and their cost-efficient detection and mitigation is thus of utmost importance. In this article, we propose a mitigation approach based on authenticated network-based time synchronization. Our approach relies on the observation that a time synchronization attack can be undetectable if and only if it targets at least three time references in the power system, and such attacks need to be mitigated through appropriate security controls. We first provide a formal proof of this result, including a characterization of the degrees of freedom of the attacker in constructing an attack. We then formulate the problem of mitigating undetectable attacks at minimum cost as an integer linear program, and prove that it is NP-hard. To solve the problem, we propose two approximation algorithms based on computing shortest paths and solving a linear relaxation of the problem. Extensive simulations suggest the superiority of the proposed algorithms on IEEE benchmark power system graphs compared with baseline solutions. We report mitigation cost savings of at least 76% compared with a naive approach for mitigation and at least 30% compared with the state-of-the-art approach.

sted, utgiver, år, opplag, sider
Institute of Electrical and Electronics Engineers (IEEE) , 2024. Vol. 11, nr 4, s. 1899-1910
Emneord [en]
Phasor measurement units, Synchronization, Voltage measurement, Costs, Power systems, Current measurement, Global Positioning System, Cyber physical systems security, phasor measurement unit, power system state etimation, precision time protocol, time synchronization attack
HSV kategori
Identifikatorer
URN: urn:nbn:se:kth:diva-360032DOI: 10.1109/TCNS.2024.3368316ISI: 001413492800001Scopus ID: 2-s2.0-85186109672OAI: oai:DiVA.org:kth-360032DiVA, id: diva2:1938147
Merknad

QC 20250226

Tilgjengelig fra: 2025-02-17 Laget: 2025-02-17 Sist oppdatert: 2025-02-26bibliografisk kontrollert

Open Access i DiVA

Fulltekst mangler i DiVA

Andre lenker

Forlagets fulltekstScopus

Person

Shereen, EzzeldinDán, György

Søk i DiVA

Av forfatter/redaktør
Shereen, EzzeldinDán, György
Av organisasjonen
I samme tidsskrift
IEEE Transactions on Control of Network Systems

Søk utenfor DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric

doi
urn-nbn
Totalt: 78 treff
RefereraExporteraLink to record
Permanent link

Direct link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf