2021
DOI: 10.1109/tsg.2020.3011391
|View full text |Cite
|
Sign up to set email alerts
|

Data-Driven False Data Injection Attacks Against Power Grids: A Random Matrix Approach

Abstract: We address the problem of constructing false data injection (FDI) attacks that can bypass the bad data detector (BDD) of a power grid. The attacker is assumed to have access to only power flow measurement data traces (collected over a limited period of time) and no other prior knowledge about the grid. Existing related algorithms are formulated under the assumption that the attacker has access to measurements collected over a long (asymptotically infinite) time period, which may not be realistic. We show that … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
37
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 65 publications
(37 citation statements)
references
References 29 publications
0
37
0
Order By: Relevance
“…The occurrence of an attack on PMUs can be identified through data-driven methods such as clustering algorithms (Wang X. et al, 2019 ) or by considering the correlation between the frequency adjustments implemented by the clock and the change in the measured phase angle (Shereen and Dán, 2020 ). Challenging types of attack act by knowing only data for a limited time period and are able to bypass the bad data detection procedures (Lakshminarayana et al, 2021 ). Cyber security applications protect devices, networks and data against digital attacks (Sun et al, 2018 ).…”
Section: Data Characteristicsmentioning
confidence: 99%
“…The occurrence of an attack on PMUs can be identified through data-driven methods such as clustering algorithms (Wang X. et al, 2019 ) or by considering the correlation between the frequency adjustments implemented by the clock and the change in the measured phase angle (Shereen and Dán, 2020 ). Challenging types of attack act by knowing only data for a limited time period and are able to bypass the bad data detection procedures (Lakshminarayana et al, 2021 ). Cyber security applications protect devices, networks and data against digital attacks (Sun et al, 2018 ).…”
Section: Data Characteristicsmentioning
confidence: 99%
“…Wang et al propose a combined model-driven and datadriven method for online frequency stability assessment and control in [20]. Lakshminarayana et al design a data-driven algorithm for conducting false data injection to bypass bad data detector in [13]. Wu et al design a data-driven storage control framework facing dynamic prices in [21].…”
Section: Related Workmentioning
confidence: 99%
“…with Λ denoting a random variable distributed as the AED of Λ in (51), and η is the abbreviation for the η-transform of Z T ΛZ that is solved from (24) for γ = 1.…”
Section: Asymptotic Ergodic Data Integritymentioning
confidence: 99%
“…It follows from Theorem 6 that we need to obtain the η-transform of Z T ΛZ from (24) to finalize the asymptotic characterization of the ergodic performance. The following proposition shows that (24) has a unique solution of η.…”
Section: Asymptotic Ergodic Data Integritymentioning
confidence: 99%
See 1 more Smart Citation