Abstract
The evolution of the electric power infrastructure into a smart grid carries with it the potential for residential homes to become malicious attackers on global state estimation. This paper presents an attack model where a distributed cyber controller in a smart grid executes an internal attack to falsify its advertised generation. This differs from current attack models in that the attacker is an active element of the system that participates in its normal operation. Through the use of information flow properties, the attack is proven to be nondeducible and thus unidentifiable in a current smart grid architecture. An adaptation of mutual exclusion is then applied to break the nondeducible attack.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Akella, R., Meng, F., Ditch, D., McMillin, B., Crow, M.: Distributed power balancing for the freedm system. In: First IEEE International Conference on Smart Grid Communications, SmartGridComm, pp. 7–12 (October 2010)
Akella, R., McMillin, B.M.: Information flow analysis of energy management in a smart grid. In: Schoitsch, E. (ed.) SAFECOMP 2010. LNCS, vol. 6351, pp. 263–276. Springer, Heidelberg (2010)
Efthymiou, C., Kalogridis, G.: Smart grid privacy via anonymization of smart metering data. In: First IEEE International Conference on Smart Grid Communications. SmartGridComm, pp. 238–243 (October 2010)
Falliere, N., Murchu, L., Chien, E.: W32. stuxnet dossier (February 2011), http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf
Gamage, T.T., McMillin, B.M., Roth, T.P.: Enforcing information flow security properties in cyber-physical systems: A generalized framework based on compensation. In: Proceedings of the 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops, COMPSACW 2010, pp. 158–163. IEEE Computer Society, Washington, DC (2010)
Lin, J., Yu, W., Yang, X., Xu, G., Zhao, W.: On false data injection attacks against distributed energy routing in smart grid. In: IEEE/ACM Third International Conference on Cyber-Physical Systems, ICCPS, pp. 183–192 (April 2012)
Liu, Y., Ning, P., Reiter, M.K.: False data injection attacks against state estimation in electric power grids. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009, pp. 21–32. ACM, New York (2009)
Raymond, K.: A distributed algorithm for multiple entries to a critical section. Information Processing Letters 30(4), 189–193 (1989)
Sutherland, D.: A model of information. In: Proceedings of the 9th National Computer Security Conference, pp. 175–183 (September 1986)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Roth, T., McMillin, B.M. (2013). Breaking Nondeducible Attacks on the Smart Grid. In: Hämmerli, B.M., Kalstad Svendsen, N., Lopez, J. (eds) Critical Information Infrastructures Security. Lecture Notes in Computer Science, vol 7722. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41485-5_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-41485-5_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-41484-8
Online ISBN: 978-3-642-41485-5
eBook Packages: Computer ScienceComputer Science (R0)