ABSTRACT
Smart grids require communication networks for supervision functions and control operations. With this they become attractive targets for attackers. In newer power grids, State Estimation (SE) is often performed based on Kalman Filters (KFs) to deal with noisy measurement data and detect Bad Data (BD) due to failures in the measurement system. Nevertheless, in a setting where attackers can gain access to modify sensor data, they can exploit the fact that SE is used to process the data. In this paper, we show how an attacker can modify Phasor Measurement Unit (PMU) sensor data in a way that it remains undetected in the state estimation process. We show how anomaly detection methods based on innovation gain fail if an attacker is aware of the state estimation and uses the right strategy to circumvent detection.
- Ettore Bompard, Tao Huang, Yingjun Wu, and Mihai Cremenescu. Classification and trend analysis of threats origins to the security of power systems. International Journal of Electrical Power and Energy Systems, 50:50--64, 2013.Google ScholarCross Ref
- P. Mohammadi and S. Mehraeen. PMU Optimal Placement using sensitivity analysis for power systems fault location. In 2015 IEEE Electrical Power and Energy Conference (EPEC), pages 244--249, Oct 2015.Google ScholarCross Ref
- European Committee for Electro technical Standardization CENELEC. Standard EN 50160 - Voltage Characteristics in Public Distribution Systems. 2011.Google Scholar
- Greg Welch and Gary Bishop. An Introduction to the Kalman Filter. Technical report, Chapel Hill, NC, USA, 1995. Google ScholarDigital Library
- J. Zhang, G. Welch, G. Bishop, and Z. Huang. A Two-Stage Kalman Filter Approach for Robust and Real-Time Power System State Estimation. IEEE Transactions on Sustainable Energy, 5(2):629--636, April 2014.Google ScholarCross Ref
- Augustin Soule, Kavé Salamatian, and Nina Taft. Combining Filtering and Statistical Methods for Anomaly Detection. In Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement, IMC '05, pages 31--31, Berkeley, CA, USA, 2005. USENIX Association. Google ScholarDigital Library
- M. Pignati, L. Zanni, S. Sarri, R. Cherkaoui, J. Y. Le Boudec, and M. Paolone. A pre-estimation filtering process of bad data for linear power systems state estimators using PMUs. In 2014 Power Systems Computation Conference, pages 1--8, Aug 2014.Google ScholarCross Ref
- J. G. Moller, M. Sorensen, H. Johansson, and J. Ostergaard. Detecting topological errors with pre-estimation filtering of bad data in wide-area measurements. In 2017 IEEE Manchester PowerTech, pages 1--6, June 2017.Google ScholarCross Ref
- S. Barreto, A. Suresh, and J. Y. Le Boudec. Cyber-attack on packet-based time synchronization protocols: The undetectable delay box. In 2016 IEEE International Instrumentation and Measurement Technology Conference, pages 1--6, May 2016.Google ScholarCross Ref
- S. Barreto Andrade, M. Pignati, G. Dan, M. Paolone, and J. Y. Le Boudec. Undetectable PMU timing-attack on linear state-estimation by using rank-1 approximation. IEEE Transactions on Smart Grid, pages 1--1, 2017.Google Scholar
- A. Ashok, M. Govindarasu, and V. Ajjarapu. Online detection of stealthy false data injection attacks in power system state estimation. IEEE Transactions on Smart Grid, 9(3):1636--1646, May 2018.Google Scholar
- G. Dan and H. Sandberg. Stealth attacks and protection schemes for state estimators in power systems. In 2010 First IEEE International Conference on Smart Grid Communications, pages 214--219, Oct 2010.Google ScholarCross Ref
- ECOLE POLYTECHNIQUE FEDERALE DE LAUSANNE - EPFL. Smart Grid and PMU measurements. Available at https://smartgrid.epfl.ch/?q=monitoring.Google Scholar
- IEEE Standard for Synchrophasor Measurements for Power Systems. IEEE Std C37.118.1-2011 (Revision of IEEE Std C37.118-2005), pages 1--61, Dec 2011.Google Scholar
- IEEE Standard for Synchrophasor Measurements for Power Systems -- Amendment 1: Modification of Selected Performance Requirements. IEEE Std C37.118.1a-2014 (Amendment to IEEE Std C37118.1-2011), pages 1--25, April 2014.Google Scholar
- P. Romano and M. Paolone. Enhanced Interpolated-DFT for Synchrophasor Estimation in FPGAs: Theory, Implementation, and Validation of a PMU Prototype. IEEE Tran. on Instrumentation and Measurement, 63(12):2824--2836, Dec 2014.Google ScholarCross Ref
- IEEE Standard for Synchrophasor Data Transfer for Power Systems. IEEE Std C37.118.2-2011 (Revision of IEEE Std C37.118-2005), pages 1--53, Dec 2011.Google Scholar
- M. Pignati, M. Popovic, S. Barreto, R. Cherkaoui, G. Dario Flores, J. Y. Le Boudec, M. Mohiuddin, M. Paolone, P. Romano, S. Sarri, T. Tesfay, D. C. Tomozei, and L. Zanni. Real-time state estimation of the EPFL-campus medium-voltage grid by using PMUs. In 2015 IEEE Power Energy Society Innovative Smart Grid Technologies Conference (ISGT), pages 1--5, Feb 2015.Google ScholarCross Ref
- R. Langner. Stuxnet: Dissecting a cyberwarfare weapon. IEEE Security Privacy, 9(3):49--51, May 2011. Google ScholarDigital Library
- Robert M. Lee, Michael J. Assante, and Tim Conway. Analysis of the Cyber Attack on the Ukrainian Power Grid. Technical report, SANS ICS and E-ISAC, March 2016.Google Scholar
- Blake Johnson, Dan Caban, Marina Krotofil, Dan Scali, Nathan Brubaker, and Christopher Glyer. Attackers Deploy New ICS Attack Framework "TRITON" and Cause Operational Disruption to Critical Infrastructure. https://www.fireeye.com/blog/threat-research/2017/12/attackers-deploy-new-ics-attack-framework-triton.html. Online; accessed March 2018.Google Scholar
- Sarita Paudel, Paul Smith, and Tanja Zseby. Data Integrity Attacks in Smart Grid Wide Area Monitoring. In 4th International Symposium for ICS & SCADA Cyber Security Research 2016 (ICS-CSR 2016), Belfast, UK, August 2016. Google ScholarDigital Library
- A.R. Bergen and V Vittal. Power Systems Analysis. Pearson/Prentice Hall, 2000.Google Scholar
- Lorenzo Zanni. Power System Estimation based on PMUs-Static and Dynamic Approaches from Theory to Real Implementation. 2017.Google Scholar
- Staliani Sarri. Methods and Performance Assessment of PMU-based Real-Time State Estimation of Active Distribution Networks. 2016.Google Scholar
- Robert Grover Brown and Patrick Y.C. Hwang. Introduction to Random Signals and Applied Kalman Filtering with Matlab Exercises. John Wiley and Sons, 2012.Google Scholar
- L. Zanni, S. Sarri, M. Pignati, R. Cherkaoui, and M. Paolone. Probabilistic assessment of the process-noise covariance matrix of discrete Kalman filter state estimation of active distribution networks. In 2014 International Conference on Probabilistic Methods Applied to Power Systems (PMAPS), pages 1--6, July 2014.Google ScholarCross Ref
- S. Sarri, L. Zanni, M. Popovic, J. Y. Le Boudec, and M. Paolone. Performance Assessment of Linear State Estimators Using Synchrophasor Measurements. IEEE Transactions on Instrumentation and Measurement, 65(3):535--548, March 2016.Google ScholarCross Ref
- F. N. Chowdhury, J. P. Christensen, and J. L. Aravena. Power system fault detection and state estimation using kalman filter with hypothesis testing. IEEE Transactions on Power Delivery, 6(3):1025--1030, Jul 1991.Google ScholarCross Ref
- A. M. L. da Silva, M. B. D. C. Filho, and J. M. C. Cantera. An efficient dynamic state estimation algorithm including bad data processing. IEEE Power Engineering Review, PER-7(11):49--49, Nov 1987.Google ScholarCross Ref
Recommendations
Cyber security considerations on PMU-based state estimation
CyberSec '18: Proceedings of the Fifth Cybersecurity SymposiumState estimation allows continuous monitoring of a power system by estimating the power system state variables from measurement data. Unfortunately, the measurement data provided by the devices can serve as attack vectors for false data injection ...
False data injection attacks against state estimation in electric power grids
A power grid is a complex system connecting electric power generators to consumers through power transmission and distribution networks across a large geographical area. System monitoring is necessary to ensure the reliable operation of power grids, and ...
Towards Fast and Semi-supervised Identification of Smart Meters Launching Data Falsification Attacks
ASIACCS '18: Proceedings of the 2018 on Asia Conference on Computer and Communications SecurityCompromised smart meters sending false power consumption data in Advanced Metering Infrastructure (AMI) may have drastic consequences on the smart grid»s operation. Most existing defense models only deal with electricity theft from individual customers (...
Comments