2011
DOI: 10.3182/20110828-6-it-1002.02210
|View full text |Cite
|
Sign up to set email alerts
|

A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State Estimator*

Abstract: The electrical power network is a critical infrastructure in today's society, so its safe and reliable operation is of major concern. State estimators are commonly used in power networks, for example, to detect faulty equipment and to optimally route power flows. The estimators are often located in control centers, to which large numbers of measurements are sent over unencrypted communication channels. Therefore cyber security for state estimators becomes an important issue. In this paper we analyze the cyber … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
66
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 82 publications
(66 citation statements)
references
References 9 publications
0
66
0
Order By: Relevance
“…Such attacks are often called stealth attacks. The observation was made using a linearized model of the SE, but it was shown later on a SCADA/EMS testbed that stealth attacks are also possible under a non-linear model [4]. Since then the security of standalone SE has received much attention [3], [4], [5], [6], [7], [8], [9], [10].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Such attacks are often called stealth attacks. The observation was made using a linearized model of the SE, but it was shown later on a SCADA/EMS testbed that stealth attacks are also possible under a non-linear model [4]. Since then the security of standalone SE has received much attention [3], [4], [5], [6], [7], [8], [9], [10].…”
Section: Related Workmentioning
confidence: 99%
“…The observation was made using a linearized model of the SE, but it was shown later on a SCADA/EMS testbed that stealth attacks are also possible under a non-linear model [4]. Since then the security of standalone SE has received much attention [3], [4], [5], [6], [7], [8], [9], [10]. Various schemes were proposed to mitigate stealth attacks, through individual data protection [5], through changes to the BDD algorithm [6], and through the protection of the SCADA infrastructure [7], [8].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Secondly, if the attacker has perfect power grid topology, then s/he can construct matrix 12 4 as follows: 16 …”
Section: Fig 1 Example 5-bus Systemmentioning
confidence: 99%
“…In particular, many recent papers have explored various aspects of data integrity attacks on SCADA/EMS systems that impact the key function of state estimation. These include computation and characterization of the attacks, and various detection and mitigation strategies based on secure PMU placement [7], [8], [9], [10], [11].…”
Section: Introductionmentioning
confidence: 99%