Abstract:
In this paper, we investigate the data integrity attack against Optimal Power Flow (OPF) with the least effort from the adversary's perspective. The investigated attack c...View moreMetadata
Abstract:
In this paper, we investigate the data integrity attack against Optimal Power Flow (OPF) with the least effort from the adversary's perspective. The investigated attack can first select the minimum number of target nodes to compromise by analyzing the difference between the capacity of transmission line and the real transmission power, and then search for a critical attack vector (with a goal to minimize the amount of information to manipulate) as an optimal attack strategy. To defend against such an attack, we develop the defensive scheme by protecting the critical nodes. Based on various IEEE standard systems, we show the effectiveness of our investigated attack scheme and the corresponding defense schemes.
Date of Conference: 08-11 January 2017
Date Added to IEEE Xplore: 20 July 2017
ISBN Information:
Electronic ISSN: 2331-9860