2017 IEEE International Conference on Smart Grid Communications (SmartGridComm) 2017
DOI: 10.1109/smartgridcomm.2017.8340729
|View full text |Cite
|
Sign up to set email alerts
|

False data injection attacks on phasor measurements that bypass low-rank decomposition

Abstract: This paper studies the vulnerability of phasor measurement units (PMUs) to false data injection (FDI) attacks. Prior work demonstrated that unobservable FDI attacks that can bypass traditional bad data detectors based on measurement residuals can be identified by detector based on low-rank decomposition (LD). In this work, a class of more sophisticated FDI attacks that captures the temporal correlation of PMU data is introduced. Such attacks are designed with a convex optimization problem and can always bypass… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 23 publications
(10 citation statements)
references
References 35 publications
0
10
0
Order By: Relevance
“…Early works typically consider static SE-FDIA, that is, attacks at a given time instant. Some recent works, for example, [43], which focus on PMUs (which have a measurement frequency of tens of Hz), consider FDIA in a setting in which measurements over a block of time are collected and then processed in batch. This results in a measurement equation Z = XH T + E, where Z is the matrix of measurements (where z ij is the measurement collected by instrument j at time i), X the state vector, H the network matrix and E the measurement errors.…”
Section: Fdia Against DC State Estimationmentioning
confidence: 99%
See 2 more Smart Citations
“…Early works typically consider static SE-FDIA, that is, attacks at a given time instant. Some recent works, for example, [43], which focus on PMUs (which have a measurement frequency of tens of Hz), consider FDIA in a setting in which measurements over a block of time are collected and then processed in batch. This results in a measurement equation Z = XH T + E, where Z is the matrix of measurements (where z ij is the measurement collected by instrument j at time i), X the state vector, H the network matrix and E the measurement errors.…”
Section: Fdia Against DC State Estimationmentioning
confidence: 99%
“…Unobservable attacks as usual take the form of A = CH T and therefore Z + A = (X + C)H T + E. Matrix A = CH T is column-sparse, meaning that only the columns corresponding to the compromised measurement units are non-zero. The measurement matrix Z instead is low-rank [43]. Hence, in literature, convex-optimizationbased decomposition methods have been developed, able to identify the attacked PMUs by separating the measurement matrix into a low rank matrix (the matrix of uncorrupted PMU measurements) and a column-sparse matrix (the attack matrix).…”
Section: Fdia Against DC State Estimationmentioning
confidence: 99%
See 1 more Smart Citation
“…Quality checking methods check for this anomaly and may employ correlation across different timestamps to identify the corruption of data. FDI is one of the widely explored attacks on synchrophasor domain, with solutions like determining the mismatch between the values obtained from PMUs and that observed in SCADA, monitoring the line impedances which get affected when data is manipulated, and using density-based Local Outlier Filter (LOF) analysis [131][132][133][134][135].…”
Section: Addressing Cyber-attacks Using Quality Issuesmentioning
confidence: 99%
“…However, it is noteworthy that various sophisticated infrastructures including the PMUs are vulnerable. Various experiences and studies in the literature have discussed PMU technology vulnerabilities to numerous intrusions and attacks [ 10 , 11 , 12 , 13 , 14 ]. Pan et al.…”
Section: Introductionmentioning
confidence: 99%