2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2018
DOI: 10.1109/icassp.2018.8461493
|View full text |Cite
|
Sign up to set email alerts
|

Trade-offs in Data-Driven False Data Injection Attacks Against the Power Grid

Abstract: We address the problem of constructing false data injection (FDI) attacks that can bypass the bad data detector (BDD) of a power grid. The attacker is assumed to have access to only power flow measurement data traces (collected over a limited period of time) and no other prior knowledge about the grid. Existing related algorithms are formulated under the assumption that the attacker has access to measurements collected over a long (asymptotically infinite) time period, which may not be realistic. We show that … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 19 publications
0
7
0
Order By: Relevance
“…Since these topology attacks depend on historical measurements, the measurement matrix H cannot be learned by the attacker immediately. The learning/inferring process usually takes a sufficiently long time (hours or days) due to the exfiltration of an enough amount of historical measurement data [27,[38][39][40][41]. • The attacker is able to eavesdrop and tamper with the measurements by intruding into the communication network or IP-accessible field devices [42].…”
Section: B Threat Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Since these topology attacks depend on historical measurements, the measurement matrix H cannot be learned by the attacker immediately. The learning/inferring process usually takes a sufficiently long time (hours or days) due to the exfiltration of an enough amount of historical measurement data [27,[38][39][40][41]. • The attacker is able to eavesdrop and tamper with the measurements by intruding into the communication network or IP-accessible field devices [42].…”
Section: B Threat Modelmentioning
confidence: 99%
“…In fact, the attacker might try to learn the perturbed measurement matrix H ′ . But the learning process usually takes a sufficiently long time (hours or days) due to the exfiltration of an enough amount of historical measurement data [27,[38][39][40][41]. In other words, the attacker cannot obtain the latest measurement matrix immediately.…”
Section: Problem Statementmentioning
confidence: 99%
“…In (2), the attacker can obtain the knowledge of power flows F lm,p by monitoring the line flow sensor measurements. On the other hand, the line reactances x lm can be learned by monitoring the grid power flows over a period of time using existing techniques [19], [20]. The attacker can also learn the reactance of the disconnected branch x l similarly.…”
Section: Power Grid Modelmentioning
confidence: 99%
“…Hence, an attack constructed using outdated knowledge of the system can be detected by the BDD. (The reader can refer to [20] for practical guidance on how frequently the branch reactances must be perturbed.) In this section, we first formalize the MTD design problem to defend against CCPAs.…”
Section: Moving-target Defense For Ccpasmentioning
confidence: 99%
“…H. Vincent Poor is with the Department of Electrical Engineering, Princeton University, USA (email: poor@princeton.edu). The work was partially presented at ICASSP-2018 [1].…”
Section: Introductionmentioning
confidence: 99%