2020
DOI: 10.1109/tifs.2019.2928624
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Moving Target Defense Against False Data Injection Attacks on Power Grid

Abstract: Recent studies have considered thwarting false data injection (FDI) attacks against state estimation in power grids by proactively perturbing branch susceptances. This approach is known as moving target defense (MTD). However, despite of the deployment of MTD, it is still possible for the attacker to launch stealthy FDI attacks generated with former branch susceptances. In this paper, we prove that, an MTD has the capability to thwart all FDI attacks constructed with former branch susceptances only if (i) the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
36
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 109 publications
(36 citation statements)
references
References 54 publications
(113 reference statements)
0
36
0
Order By: Relevance
“…However, the detection effectiveness of MTDs under these two placements is not considered. Max-rank placement [129], [130] can make MTDs achieve the maximum rank of the composite matrix ( i.e., max-rank MTDs), a metric of the detection effectiveness. Spanning-tree placement proposed in [131] installs D-FACTS devices on the lines which form a spanning tree of the system.…”
Section: E Moving Target Defensementioning
confidence: 99%
See 2 more Smart Citations
“…However, the detection effectiveness of MTDs under these two placements is not considered. Max-rank placement [129], [130] can make MTDs achieve the maximum rank of the composite matrix ( i.e., max-rank MTDs), a metric of the detection effectiveness. Spanning-tree placement proposed in [131] installs D-FACTS devices on the lines which form a spanning tree of the system.…”
Section: E Moving Target Defensementioning
confidence: 99%
“…Thus, these two methods must be constructed in the D-FACTS placements, which ensure the detection effectiveness, such as the max-rank placements. Second, the optimization-based operation takes both the economic cost and the detection effectiveness into account, in which the metric of detection effectiveness is maximized or taken as constraints [128], [130]. Finally, the hidden MTD operation method delicately selects D-FACTS setpoints such that all measurements remain the same after MTD is applied [134]- [136].…”
Section: E Moving Target Defensementioning
confidence: 99%
See 1 more Smart Citation
“…Under AC state estimation, system measurements will consist of real power flows defined by (2) and reactive power by (19)…”
Section: E Mtd Through Topology Changesmentioning
confidence: 99%
“…In particular, MTD is proposed through either transmission switching [16] or admittance perturbation via distributed flexible AC transmissions (D-FACTS) devices [17][18] to change physical system topology to proactively drive BDD. An analysis of MTD against FDI attacks is offered in [19] where they prove the susceptibility of isolated state measurements and design an algorithm for branch perturbation selection. Some limitations of MTD were explored in [20].…”
Section: Introductionmentioning
confidence: 99%