Loading [a11y]/accessibility-menu.js
Stealthy attacks in power systems: Limitations on manipulating the estimation deviations caused by switching network topologies | IEEE Conference Publication | IEEE Xplore

Stealthy attacks in power systems: Limitations on manipulating the estimation deviations caused by switching network topologies


Abstract:

The reliability and robustness of the power system have gained increasing attention as the trend of including more information infrastructures into the current power grid...Show More

Abstract:

The reliability and robustness of the power system have gained increasing attention as the trend of including more information infrastructures into the current power grid. The stealthy attack is a kind of cyber attack that is undetectable to any residue-based detection scheme. Our previous work [1] has shown that the existence of such attacks can be eliminated by rotationally switching off one of some preselected links which contain a spanning tree of the network graph. In this paper, we extend our previous work, to consider the case when the attack is only stealthy in some of the topologies. The possible consistent deviations of the estimated states are formulated. We show that as the attack is stealthy in more topologies, the flexibility of such deviations is linearly decreased. Several cases are studied to show this trade-off.
Date of Conference: 15-17 December 2014
Date Added to IEEE Xplore: 12 February 2015
ISBN Information:
Print ISSN: 0191-2216
Conference Location: Los Angeles, CA, USA

Contact IEEE to Subscribe

References

References is not available for this document.