2019
DOI: 10.1109/access.2018.2890604
|View full text |Cite
|
Sign up to set email alerts
|

Multilevel Programming-Based Coordinated Cyber Physical Attacks and Countermeasures in Smart Grid

Abstract: Since the Ukraine blackout in 2015, coordinated cyber-physical attacks (CCPAs) have been emerging and are used to mask line outages in the smart grid. In this paper, we investigate the features of CCPAs and constitute the mathematic formulation with respect to topologies and electric parameters of a power grid before and after attacks. With the objective of maximizing the number of overloaded lines, a bilevel programming model is developed to describe the interaction between the adversary and the control cente… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2019
2019
2025
2025

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 40 publications
(24 citation statements)
references
References 38 publications
0
24
0
Order By: Relevance
“…The same concept was exploited in [6] by an attacker seeking to maximize the loading of a transmission line. Zhang and Sankar developed in [7] an elaborate bilevel formulation for an attacker using load redistribution in order to hide a physical change in the grid topology, while a model of an attacker seeking to maximize the number of overloads induced through load redistribution has been presented in [8].…”
Section: A Related Literaturementioning
confidence: 99%
See 2 more Smart Citations
“…The same concept was exploited in [6] by an attacker seeking to maximize the loading of a transmission line. Zhang and Sankar developed in [7] an elaborate bilevel formulation for an attacker using load redistribution in order to hide a physical change in the grid topology, while a model of an attacker seeking to maximize the number of overloads induced through load redistribution has been presented in [8].…”
Section: A Related Literaturementioning
confidence: 99%
“…Expression (3) imposes a limit on the maximum number of load meters that can be manipulated by the attacker, while (4) enforces that the false load measurement data injection is balanced across the grid and ( 5) sets the maximum relative amount of false data that can be injected by the attacker at any node 1 . Equalities (7,8) model the power flow of the grid as perceived by the cyber-attacker only. Notice that the power balance constraint (7) includes the optimal values of the generation redispatch variables (p g ) as decided in the gridoperator's lower-level problem (20 -26).…”
Section: Cyber-attacker Decision-making Problemmentioning
confidence: 99%
See 1 more Smart Citation
“…Analysis based on topological models or simulation platforms always focus on implementation scheme rather than the decision strategies of the attack and so the intention of the attacker and other subjective factors are generally omitted. Some studies concerning with attack intention employed game theory and multilevel programming to model attack-and-defense competition with optimal strategies, such as Static game for attack probability modeling [19][20][21], Colonel Blotto game and Stackelberg game for optimal attack resource allocation [22,29], Markov game for dynamic attack modeling [23][24][25], Tri-level programming model for vulnerability assessment and component protection [26][27][28]. However, the factors affecting attack decision making and the diversity of attack intention have not been fully coved in existing studies, primarily due to the difficulty of data acquisition of necessary information for characterizing the attack behaviors in detail.…”
Section: Introductionmentioning
confidence: 99%
“…Large-scale blackouts have happened worldwide during the past decades, resulting in economic loss, social inconvenience, and cyber physical-attacks [1]- [5]. For the sake of ensuring security and reliability of the power system operation, the principle of N − 1 security is widely employed in industry [6], where the whole system is required to withstand the failure of any single component.…”
Section: Introductionmentioning
confidence: 99%