Detecting Malicious Manipulation of Synchrophasor Data

被引:0
|
作者
Pal, Seemita [1 ]
Sikdar, Biplab [1 ]
Chow, Joe H. [1 ]
机构
[1] Rensselaer Polytech Inst, Dept Elect Comp & Syst Engn, Troy, NY 12180 USA
来源
2015 IEEE INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM) | 2015年
关键词
Cyber-security; smart grid; synchrophasor network;
D O I
暂无
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
The electrical grid is one of the critical infrastructures of any country whose importance makes them an attractive target for malicious cyber attacks. This paper considers the particular case of data modification attacks in smart grids, where the data generated by Phasor Measurement Units (PMUs) is modified by the adversary in order to introduce errors in the monitoring and control applications that rely on PMU data. The proposed methodology is based on evaluating the equivalent impedance of a transmission line from buses at its either end. The deviations in the magnitude and angle of the equivalent impedances in the presence of a data modification attack are used to detect the attack. Extensive simulations using real PMU data are used to verify the accuracy of the proposed detection mechanism.
引用
收藏
页码:145 / 150
页数:6
相关论文
共 50 条
  • [1] Detecting malicious manipulation in grid enviromments
    Martins, Felipe
    Maia, Marcio
    de Castro Andrade, Rossana M.
    dos Santos, Aldri L.
    Neuman de Souza, Jose
    SBAC-OAD 2006: 18TH INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE AND HIGH PERFORMANCE COMPUTING, 2006, : 28 - +
  • [2] Malicious Synchrophasor Detection Based on Highly Imbalanced Historical Operational Data
    Wang, Jingyu
    Sun, Zhengwei
    Bao, Bin
    Shi, Dongyuan
    CSEE JOURNAL OF POWER AND ENERGY SYSTEMS, 2019, 5 (01): : 11 - 20
  • [3] A Mechanism for Detecting Gray Hole Attacks on Synchrophasor Data
    Pal, Seemita
    Li, Huijiang
    Sikdar, Biplab
    Chow, Joe
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 4131 - 4136
  • [4] A behavioral model to detect data manipulation attacks of synchrophasor measurements
    Stylianou, Leonidas
    Hadjidemetriou, Lenos
    Asprou, Markos
    Zacharia, Lazaros
    Michael, Maria K.
    2021 IEEE PES INNOVATIVE SMART GRID TECHNOLOGY EUROPE (ISGT EUROPE 2021), 2021, : 383 - 388
  • [5] Invertible watermarking algorithm with detecting locations of malicious manipulation for biometric image authentication
    Lim, J
    Lee, H
    Lee, S
    Kim, J
    ADVANCES IN BIOMETRICS, PROCEEDINGS, 2006, 3832 : 763 - 769
  • [6] Chaining watermarks for detecting malicious modifications to streaming data
    Guo, Huiping
    Li, Yingjiu
    Jajodia, Sushil
    INFORMATION SCIENCES, 2007, 177 (01) : 281 - 298
  • [7] Detecting Data Tampering Attacks in Synchrophasor Networks using Time Hopping
    Aman, Muhammad Naveed
    Javed, Kashif
    Sikdar, Biplab
    Chua, Kee Chaing
    2016 IEEE PES INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE EUROPE (ISGT-EUROPE), 2016,
  • [8] Resilience Against Data Manipulation in Distributed Synchrophasor-Based Mode Estimation
    Rajabi, Arezoo
    Bobba, Rakesh B.
    IEEE TRANSACTIONS ON SMART GRID, 2021, 12 (04) : 3538 - 3547
  • [9] A Mechanism for Detecting Data Manipulation Attacks on PMU Data
    Pal, Seemita
    Sikdar, Biplab
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS (ICCS), 2014, : 253 - 257
  • [10] Detecting Malicious Data Injections in Wireless Sensor Networks: A Survey
    Illiano, Vittorio P.
    Lupu, Emil C.
    ACM COMPUTING SURVEYS, 2015, 48 (02)