A Review of False Data Injection Attacks Against Modern Power Systems

被引:589
|
作者
Liang, Gaoqi [1 ]
Zhao, Junhua [1 ]
Luo, Fengji [1 ]
Weller, Steven R. [2 ]
Dong, Zhao Yang [3 ]
机构
[1] Univ Newcastle, Ctr Intelligent Elect Networks, Callaghan, NSW 2308, Australia
[2] Univ Newcastle, Sch Elect Engn & Comp Sci, Callaghan, NSW 2308, Australia
[3] Univ Sydney, Sch Elect & Informat Engn, Sydney, NSW 2006, Australia
关键词
Cyber-physical security; false data injection attacks; state estimation; power system; STATE ESTIMATION; DEFENSE; IMPACT;
D O I
10.1109/TSG.2015.2495133
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With rapid advances in sensor, computer, and communication networks, modern power systems have become complicated cyber-physical systems. Assessing and enhancing cyber-physical system security is, therefore, of utmost importance for the future electricity grid. In a successful false data injection attack (FDIA), an attacker compromises measurements from grid sensors in such a way that undetected errors are introduced into estimates of state variables such as bus voltage angles and magnitudes. In evading detection by commonly employed residue-based bad data detection tests, FDIAs are capable of severely threatening power system security. Since the first published research on FDIAs in 2009, research into FDIA-based cyber-attacks has been extensive. This paper gives a comprehensive review of state-of-the-art in FDIAs against modern power systems. This paper first summarizes the theoretical basis of FDIAs, and then discusses both the physical and the economic impacts of a successful FDIA. This paper presents the basic defense strategies against FDIAs and discusses some potential future research directions in this field.
引用
收藏
页码:1630 / 1638
页数:9
相关论文
共 50 条
  • [1] Literature Review on False Data Injection Attacks Against Power System
    Liang, Gaoqi
    Zhao, Junhua
    Luo, Fengji
    Weller, Steven R.
    Dong, Zhao Yang
    IEEE SOUTHEASTCON 2020, 2020,
  • [2] Defense Optimization in Power Systems against False Data Injection Attacks
    Hong, Feiyang
    Bao, Zhejing
    You, Miao
    PROCEEDINGS OF THE 33RD CHINESE CONTROL AND DECISION CONFERENCE (CCDC 2021), 2021, : 2551 - 2556
  • [3] Optimal Protection Strategy Against False Data Injection Attacks in Power Systems
    Liu, Xuan
    Li, Zhiyi
    Li, Zuyi
    IEEE TRANSACTIONS ON SMART GRID, 2017, 8 (04) : 1802 - 1810
  • [4] False Data Injection Attacks Against State Estimation in Power Distribution Systems
    Deng, Ruilong
    Zhuang, Peng
    Liang, Hao
    IEEE TRANSACTIONS ON SMART GRID, 2019, 10 (03) : 2871 - 2881
  • [5] Advanced Persistent False Data Injection Attacks Against Optimal Power Flow in Power Systems
    Umar, Sani
    Felemban, Muhamad
    Osais, Yahya
    IWCMC 2021: 2021 17TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2021, : 469 - 474
  • [6] Power Grid Resilience Against False Data Injection Attacks
    Yan, Jun
    Tang, Yufei
    Tang, Bo
    He, Haibo
    Sun, Yan
    2016 IEEE POWER AND ENERGY SOCIETY GENERAL MEETING (PESGM), 2016,
  • [7] Datadriven false data injection attacks against cyber-physical power systems
    Tian, Jiwei
    Wang, Buhong
    Li, Jing
    Konstantinou, Charalambos
    COMPUTERS & SECURITY, 2022, 121
  • [8] Protection Against Graph-Based False Data Injection Attacks on Power Systems
    Morgenstern G.
    Kim J.
    Anderson J.
    Zussman G.
    Routtenberg T.
    IEEE Transactions on Control of Network Systems, 2024, 11 (04): : 1 - 12
  • [9] Modelling and Countermeasures of False Data Injection Attacks Against State Estimation in Power Systems
    Alayande, Akintunde Samson
    Nwulu, Nnamdi
    Bakare, Ayodeji Emmanuel
    PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON COMPUTATIONAL TECHNIQUES, ELECTRONICS AND MECHANICAL SYSTEMS (CTEMS), 2018, : 129 - 134
  • [10] Modeling and Detecting False Data Injection Attacks against Railway Traction Power Systems
    Lakshminarayana, Subhash
    Teng, Teo Zhan
    Tan, Rui
    Yau, David K. Y.
    ACM TRANSACTIONS ON CYBER-PHYSICAL SYSTEMS, 2018, 2 (04)