Abstract:
Cyber-security in power systems has become a hot topic in recent years. Injection of malicious data into the system data by cyber attackers may lead to a change in states...Show MoreMetadata
Abstract:
Cyber-security in power systems has become a hot topic in recent years. Injection of malicious data into the system data by cyber attackers may lead to a change in states of the system causing potential problems such as power outages on the grid. Commonly used forms of malicious data detection in cyber-attacks on the grid can be floored when the cyber attacker cleverly computes the contamination vectors using information of the system gained from the system data intercepted. This paper presents a further stage of validation to our earlier proposed approach using a situation in which the data available to the cyber-attacker is limited due to the encryption method. The main idea in the proposed approach entailed altering information on system topology transmitted through communication channels by the insertion of virtual buses to the network topology visible from the attacker's point of view. The attacker is misled by the existence of the virtual buses referred to as “spy nodes” in the network and therefore unable to obtain the exact topology of the power grid. These spy nodes compute data along with the actual data in the power network and are able to change the perceived topology of the network on which the attacker depends. The applicability of the proposed method was verified by simulating the IEEE 9-bus standard system when the attacker had access to limited data and had a partial attack on the system. On the other hand, the conventional methods could detect the manipulation of the partial data because of the norms being different before and after the smart attack.
Date of Conference: 19-21 May 2016
Date Added to IEEE Xplore: 08 August 2016
ISBN Information:
Electronic ISSN: 2154-0373