Modeling and Detecting False Data Injection Attacks against Railway Traction Power Systems

被引:4
|
作者
Lakshminarayana, Subhash [1 ,5 ]
Teng, Teo Zhan [2 ,6 ]
Tan, Rui [3 ,7 ]
Yau, David K. Y. [4 ,8 ]
机构
[1] Adv Digital Sci Ctr Illinois, Singapore, Singapore
[2] GovTech, Singapore, Singapore
[3] Nanyang Technol Univ, Singapore, Singapore
[4] Singapore Univ Technol & Design, Singapore, Singapore
[5] 1 CREATE Way,14-02 CREATE Tower, Singapore 138602, Singapore
[6] 10 Pasir Panjang Rd,10-01 Mapletree Business City, Singapore 117438, Singapore
[7] N4-02C-85,50 Nanyang Ave, Singapore 639798, Singapore
[8] 8 Somapah Rd, Singapore 487372, Singapore
基金
新加坡国家研究基金会;
关键词
Railway traction power systems; false data injection attacks; global attack detection; efficiency and safety;
D O I
10.1145/3226030
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Modern urban railways extensively use computerized sensing and control technologies to achieve safe, reliable, and well-timed operations. However, the use of these technologies may provide a convenient leverage to cyber-attackers who have bypassed the air gaps and aim at causing safety incidents and service disruptions. In this article, we study False Data Injection (FDI) attacks against railway Traction Power Systems (TPSes). Specifically, we analyze two types of FDI attacks on the train-borne voltage, current, and position sensor measurements-which we call efficiency attack and safety attack-that (i) maximize the system's total power consumption and (ii) mislead trains' local voltages to exceed given safety-critical thresholds, respectively. To counteract, we develop a Global Attack Detection (GAD) system that serializes a bad data detector and a novel secondary attack detector designed based on unique TPS characteristics. With intact position data of trains, our detection system can effectively detect FDI attacks on trains' voltage and current measurements even if the attacker has full and accurate knowledge of the TPS, attack detection, and real-time system state. In particular, the GAD system features an adaptive mechanism that ensures low false-positive and negative rates in detecting the attacks under noisy system measurements. Extensive simulations driven by realistic running profiles of trains verify that a TPS setup is vulnerable to FDI attacks, but these attacks can be detected effectively by the proposed GAD while ensuring a low false-positive rate.
引用
收藏
页数:29
相关论文
共 50 条
  • [21] Approximate Power Grid Protection Against False Data Injection Attacks
    Ly, Kelvin
    Kwiat, Kevin
    Kamhoua, Charles
    Njilla, Laurent
    Jin, Yier
    2017 IEEE 15TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 15TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 3RD INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS(DASC/PICOM/DATACOM/CYBERSCI, 2017, : 527 - 533
  • [22] Multi-agent System for Detecting False Data Injection Attacks Against the Power Grid<bold> </bold>
    Amullen, Esther
    Lin, Hui
    Kalbarczyk, Zbigniew
    Keel, Lee
    2ND ANNUAL INDUSTRIAL CONTROL SYSTEM SECURITY WORKSHOP, ICSS 2016, 2016, : 38 - 44
  • [23] False Data Injection Attacks against Low Voltage Distribution Systems
    Radoglou-Grammatikis, Panagiotis
    Dalamagkas, Christos
    Lagkas, Thomas
    Zafeiropoulou, Magda
    Atanasova, Maria
    Zlatev, Pencho
    Boulogeorgos, Alexandros-Apostolos A.
    Argyriou, Vasileios
    Markakis, Evangelos K.
    Moscholios, Ioannis
    Sarigiannidis, Panagiotis
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 1856 - 1861
  • [24] The data recovery strategy on machine learning against false data injection attacks in power cyber physical systems
    Li, Qinxue
    Yang, Xiaofen
    Xie, Xuhuan
    Liu, Guiyun
    MEASUREMENT & CONTROL, 2024,
  • [25] False Data Injection Attacks Induced Sequential Outages in Power Systems
    Che, Liang
    Liu, Xuan
    Li, Zuyi
    Wen, Yunfeng
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2019, 34 (02) : 1513 - 1523
  • [26] Detecting Stealthy False Data Injection Attacks in Power Grids Using Deep Learning
    Ashrafuzzaman, Mohammad
    Chakhchoukh, Yacine
    Jillepalli, Ananth A.
    Tosic, Predrag T.
    de Leon, Daniel Conte
    Sheldon, Frederick T.
    Johnson, Brian K.
    2018 14TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2018, : 219 - 225
  • [27] Stealthy False Data Injection Attacks against State Estimation in Power Systems: Switching Network Topologies
    Wang, Shaocheng
    Ren, Wei
    2014 AMERICAN CONTROL CONFERENCE (ACC), 2014,
  • [28] Detecting False Data Injection Attacks Using Canonical Variate Analysis in Power Grid
    Pei, Chao
    Xiao, Yang
    Liang, Wei
    Han, Xiaojia
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (02): : 971 - 983
  • [29] Kalman Filter with Diffusion Strategies for Detecting Power Grid False Data Injection Attacks
    Jiang, Yufan
    Hui, Qing
    2017 IEEE INTERNATIONAL CONFERENCE ON ELECTRO INFORMATION TECHNOLOGY (EIT), 2017, : 254 - 259
  • [30] Protection of Power System State Estimation against False Data Injection Attacks
    Khalaf, Mohsen
    Ayad, Abdelrahman
    Kundur, Deepa
    2023 IEEE CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, CCECE, 2023,