Survey of false data injection attacks in power transmission systems

被引:0
|
作者
Wang X. [1 ]
Tian M. [1 ]
Dong Z. [2 ]
Zhu G. [1 ]
Long J. [1 ]
Dai D. [1 ]
Zhang Q. [3 ]
机构
[1] Electronic Information School, Wuhan University, Wuhan, 430072, Hubei Province
[2] School of Power and Mechanical Engineering, Wuhan University, Wuhan, 430072, Hubei Province
[3] College of Mathematics and Computer, Hubei University of Art and Science, Xiangyang, 441053, Hubei Province
来源
Dianwang Jishu | / 11卷 / 3406-3414期
基金
中国国家自然科学基金;
关键词
False data injection attacks; Information security; L[!sub]0[!/sub]-norm; Residue; State estimation;
D O I
10.13335/j.1000-3673.pst.2016.11.019
中图分类号
学科分类号
摘要
False data injection attacks (FDIAs) take advantage of flaws of bad data detection in transmission system state estimate based on residue. By injecting false data to supervisory control and data acquisition(SCADA) system, FDIAs attackers can achieve some illegal goals, such as modifying measurements and state variables, controlling operations, gaining profits, etc. Fundamental theories and implementation mechanism of FDIAs were illustrated. State-of-arts of FDIAs were teased out from perspective of attack strategies and countermeasures, information integrity of power systems, extended attacking methods of FDIAs and optimization of attacking vectors. Advantages and disadvantages of different research results were also analyzed. Effects of FDIAs on distributed state estimation, FDIAs in hybrid SCADA/PMU measurements and countermeasures based on multi-agent were prospected. © 2016, Power System Technology Press. All right reserved.
引用
收藏
页码:3406 / 3414
页数:8
相关论文
共 66 条
  • [1] Mei S., Wang Y., Chen L., Overviews and prospects of the cyber security of smart grid from the view of complex network theory, High Voltage Engineering, 37, 3, pp. 672-679, (2011)
  • [2] Zhao J., Wen F., Xue Y., Et al., Modeling analysis and control research framework of cyber physical power system, Automation of Electric Power Systems, 35, 16, pp. 1-8, (2011)
  • [3] Su S., Wu C., Ma J., Et al., Attacker's perspective based analysis on cyber attack mode to cyber-physical system, Power System Technology, 38, 11, pp. 3115-3120, (2014)
  • [4] Wang J., Gao L., Diao Q., Et al., Comprehensive performance evaluation model of grid information system, Power System Technology, 39, 9, pp. 2653-2657, (2015)
  • [5] Qu Z., Lin H., Jiang J., Real-time publish/subscribe of monitoring information flow based on newsboy earnings mechanism, Power System Technology, 39, 9, pp. 2665-2670, (2015)
  • [6] Ni L., Wen F., Shang J., Et al., A preliminary investigation on information economics in energy internet environment, Power System Technology, 40, 6, pp. 1612-1619, (2016)
  • [7] Wang X., Shi Y., Zhang J., Et al., Computation services and applications of electricity big data based on hadoop, Power System Technology, 39, 11, pp. 3128-3133, (2015)
  • [8] Chen L., Mei S., Cheng Y., Smart grid information security and its influence on power system survivability, Control Theory & Applications, 29, 2, pp. 240-244, (2012)
  • [9] Ye X., Wen F., Shang J., Et al., Propagation mechanism of cyber physical security risks in power systems, Power System Technology, 39, 11, pp. 3072-3079, (2015)
  • [10] Rosinger C., Uslar M., Smart Grid Security: IEC 62351 and Other Relevant Standards, pp. 129-146, (2013)