메뉴 건너뛰기




Volumn 32, Issue 7, 2014, Pages 1460-1470

Data framing attack on state estimation

Author keywords

bad data test; cyber security; data framing attack; Power system state estimation; smart grid

Indexed keywords

BENCHMARKING; QUADRATIC PROGRAMMING; STATE ESTIMATION;

EID: 84906703168     PISSN: 07338716     EISSN: None     Source Type: Journal    
DOI: 10.1109/JSAC.2014.2332032     Document Type: Article
Times cited : (76)

References (36)
  • 1
    • 74049113264 scopus 로고    scopus 로고
    • False data injection attacks against state estimation in electric power grids
    • Y. Liu, P. Ning, andM. K. Reiter, "False data injection attacks against state estimation in electric power grids," in Proc. 16th ACM Conf. Comput. Commun. Security, 2009, pp. 21-32.
    • (2009) Proc. 16th ACM Conf. Comput. Commun. Security , pp. 21-32
    • Liu, Y.1    Ning, P.2    Reiter, M.K.3
  • 2
    • 82155162476 scopus 로고    scopus 로고
    • Malicious data attacks on the smart grid
    • Dec.
    • O. Kosut, L. Jia, R. J. Thomas, and L. Tong, "Malicious data attacks on the smart grid," IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 645-658, Dec. 2011.
    • (2011) IEEE Trans. Smart Grid , vol.2 , Issue.4 , pp. 645-658
    • Kosut, O.1    Jia, L.2    Thomas, R.J.3    Tong, L.4
  • 4
    • 79954575826 scopus 로고    scopus 로고
    • Malicious data attacks on smart grid state estimation: Attack strategies and countermeasures
    • Gaithersburg, MD, USA, Oct.
    • O. Kosut, L. Jia, R. J. Thomas, and L. Tong, "Malicious data attacks on smart grid state estimation: Attack strategies and countermeasures," in Proc. IEEE Smart Grid Commun., Gaithersburg, MD, USA, Oct. 2010, pp. 220-225.
    • (2010) Proc. IEEE Smart Grid Commun. , pp. 220-225
    • Kosut, O.1    Jia, L.2    Thomas, R.J.3    Tong, L.4
  • 5
    • 84857230860 scopus 로고    scopus 로고
    • Detecting false data injection attacks on dc state estimation
    • Stockholm, Sweeden Apr.
    • R. B. Bobba et al., "Detecting false data injection attacks on dc state estimation," in Proc. 1st Workshop Secure Control Syst. CPSWEEK, Stockholm, Sweeden, Apr. 2010, pp. 1-9.
    • (2010) Proc. 1st Workshop Secure Control Syst. CPSWEEK , pp. 1-9
    • Bobba, R.B.1
  • 6
  • 7
    • 0022059192 scopus 로고
    • Network observability: Theory
    • May
    • A.Monticelli and F. F.Wu, "Network observability: Theory," IEEE Trans. Power App. Syst., vol. PAS-104, no. 5, pp. 1042-1048, May 1985.
    • (1985) IEEE Trans. Power App. Syst. , vol.PAS-104 , Issue.5 , pp. 1042-1048
    • Monticelli, A.1    Wu, F.F.2
  • 8
    • 0022060812 scopus 로고
    • Network observability: Identification of observable islands and measurement placement
    • A. Monticelli and F. F. Wu, "Network observability: Identification of observable islands and measurement placement," IEEE Trans. Power App. Syst., vol. PAS-104, no. 5, pp. 1035-1041, May 1985. (Pubitemid 15476791)
    • (1985) IEEE transactions on power apparatus and systems , vol.PAS-104 , Issue.5 , pp. 1035-1041
    • Monticelli, A.1    Wu Felix, F.2
  • 9
    • 85027945316 scopus 로고    scopus 로고
    • Strategic protection against data injection attacks on power grids
    • Jun.
    • T. Kim and H. Poor, "Strategic protection against data injection attacks on power grids," IEEE Trans. Smart Grid, vol. 2, no. 2, pp. 326-333, Jun. 2011.
    • (2011) IEEE Trans. Smart Grid , vol.2 , Issue.2 , pp. 326-333
    • Kim, T.1    Poor, H.2
  • 10
    • 84863349904 scopus 로고    scopus 로고
    • Defending mechanisms against false-data injection attacks in the power system state estimation
    • Houston, TX, USA, Dec.
    • S. Bi and Y. Zhang, "Defending mechanisms against false-data injection attacks in the power system state estimation," in Proc. IEEE GLOBECOM Workshops, Houston, TX, USA, Dec. 2011, pp. 1162-1167.
    • (2011) Proc. IEEE GLOBECOM Workshops , pp. 1162-1167
    • Bi, S.1    Zhang, Y.2
  • 11
    • 84855833052 scopus 로고    scopus 로고
    • Smart grid data integrity attacks: Characterizations and countermeasures
    • Oct.
    • A. Giani et al., "Smart grid data integrity attacks: Characterizations and countermeasures," in Proc. IEEE Int. Conf. Smart Grid Commun., Oct. 2011, pp. 232-237.
    • (2011) Proc. IEEE Int. Conf. Smart Grid Commun. , pp. 232-237
    • Giani, A.1
  • 12
    • 84880239145 scopus 로고    scopus 로고
    • On topology attack of a smart grid: Undetectable attacks and countermeasures
    • Jul.
    • J. Kim and L. Tong, "On topology attack of a smart grid: Undetectable attacks and countermeasures," IEEE J. Sel. Areas Commun., vol. 31, no. 7, pp. 1294-1305, Jul. 2013.
    • (2013) IEEE J. Sel. Areas Commun. , vol.31 , Issue.7 , pp. 1294-1305
    • Kim, J.1    Tong, L.2
  • 13
    • 0022095056 scopus 로고
    • Multiple bad data detectability and identifiability: A geometric approach
    • K. Clements and P. Davis, "Multiple bad data detectability and identifiability: A geometric approach," IEEE Trans. Power Del., vol. PWRD-1, no. 3, pp. 355-360, Jul. 1986. (Pubitemid 16629654)
    • (1985) IEEE Transactions on Power Delivery , vol.PWRD-1 , Issue.3 , pp. 355-360
    • Clements, K.A.1    Davis, P.W.2
  • 14
    • 0026206560 scopus 로고
    • Identification and updating of minimally dependent sets of measurements in state estimation
    • DOI 10.1109/59.119239
    • G. Korres and G. Contaxis, "Identification and updating of minimally dependent sets of measurements in state estimation," IEEE Trans. Power Syst., vol. 6, no. 3, pp. 999-1005, Aug. 1991. (Pubitemid 21690195)
    • (1991) IEEE Transactions on Power Systems , vol.6 , Issue.3 , pp. 999-1005
    • Korres George, N.1    Contaxis George, C.2
  • 15
    • 84885756672 scopus 로고    scopus 로고
    • Stealth attacks and protection schemes for state estimators in power systems
    • Gaithersburg, MD, USA, Oct.
    • G. Dán and H. Sandberg, "Stealth attacks and protection schemes for state estimators in power systems," in Proc. IEEE Smart Grid Commun., Gaithersburg, MD, USA, Oct. 2010, pp. 214-219.
    • (2010) Proc. IEEE Smart Grid Commun. , pp. 214-219
    • Dán, G.1    Sandberg, H.2
  • 16
    • 84855825082 scopus 로고    scopus 로고
    • Network-layer protection schemes against stealth attacks on state estimators in power systems
    • Oct.
    • O. Vukovic, K. C. Sou, G. Dan, and H. Sandberg, "Network-layer protection schemes against stealth attacks on state estimators in power systems," in Proc. IEEE Int. Conf. Smart Grid Commun., Oct. 2011, pp. 184-189.
    • (2011) Proc. IEEE Int. Conf. Smart Grid Commun. , pp. 184-189
    • Vukovic, O.1    Sou, K.C.2    Dan, G.3    Sandberg, H.4
  • 18
    • 0020749591 scopus 로고
    • Reliable bad data processing for real-time state estimation
    • A. Monticelli and A. Garcia, "Reliable bad data processing for real-time state estimation," IEEE Trans. Power App. Syst., vol. PAS-102, no. 5, pp. 1126-1139, May 1983. (Pubitemid 13544532)
    • (1983) IEEE transactions on power apparatus and systems , vol.PAS-102 , Issue.5 , pp. 1126-1139
    • Monticelli, A.1    Garcia, A.2
  • 19
    • 0022148881 scopus 로고
    • Bad data identification methods in power system state estimation - A comparative study
    • T. Van Cutsem, M. Ribbens-Pavella, and L. Mili, "Bad data identification methods in power system state estimation-A comparative study," IEEE Trans. Power App. Syst., vol. PAS-104, no. 11, pp. 3037-3049, Nov. 1985. (Pubitemid 16524642)
    • (1985) IEEE transactions on power apparatus and systems , vol.PAS-104 , Issue.11 , pp. 3037-3049
    • Mili, L.1    Van Cutsem, Th.2    Ribbens-Pavella, M.3
  • 20
    • 0021529208 scopus 로고
    • Hypothesis testing identification: A new method for bad data analysis in power system state estimation
    • L. Mili, T. Van Cutsem, and M. Ribbens-Pavella, "Hypothesis testing identification: A new method for bad data analysis in power system state estimation," IEEE Trans. Power App. Syst., vol. PAS-103, no. 11, pp. 3239-3252, Nov. 1984. (Pubitemid 14662339)
    • (1984) IEEE transactions on power apparatus and systems , vol.PAS-103 , Issue.11 , pp. 3239-3252
    • Mili, L.1    Cutsem Th.Van2    Ribbens-Pavella, M.3
  • 23
    • 0020116808 scopus 로고
    • Bad data rejection properties of weighted least absolute value techniques applied to static state estimation
    • Apr.
    • W. W. Kotiuga and M. Vidyasagar, "Bad data rejection properties of weighted least absolute value techniques applied to static state estimation," IEEE Trans. Power App. Syst., vol. PAS-101, no. 4, pp. 844-853, Apr. 1982.
    • (1982) IEEE Trans. Power App. Syst. , vol.PAS-101 , Issue.4 , pp. 844-853
    • Kotiuga, W.W.1    Vidyasagar, M.2
  • 24
    • 0026105479 scopus 로고
    • A fast algorithm for the weighted least absolute value state estimation [for power systems]
    • Feb.
    • A. Abur and M. Celik, "A fast algorithm for the weighted least absolute value state estimation [for power systems]," IEEE Trans. Power Syst., vol. 6, no. 1, pp. 1-8, Feb. 1991.
    • (1991) IEEE Trans. Power Syst. , vol.6 , Issue.1 , pp. 1-8
    • Abur, A.1    Celik, M.2
  • 25
    • 0026819316 scopus 로고
    • A robust WLAV state estimator using transformations
    • Feb.
    • M. Celik and A. Abur, "A robust WLAV state estimator using transformations," IEEE Trans. Power Syst., vol. 7, no. 1, pp. 106-113, Feb. 1992.
    • (1992) IEEE Trans. Power Syst. , vol.7 , Issue.1 , pp. 106-113
    • Celik, M.1    Abur, A.2
  • 26
    • 0028479976 scopus 로고
    • Weighted least absolute value state estimation using interior point methods
    • Aug.
    • H. Singh and F. Alvarado, "Weighted least absolute value state estimation using interior point methods," IEEE Trans. Power Syst., vol. 9, no. 3, pp. 1478-1484, Aug. 1994.
    • (1994) IEEE Trans. Power Syst. , vol.9 , Issue.3 , pp. 1478-1484
    • Singh, H.1    Alvarado, F.2
  • 28
    • 0030215904 scopus 로고    scopus 로고
    • Identification of multiple interacting bad data via power system decomposition
    • M. Cheniae, L. Mili, and P. Rousseeuw, "Identification of multiple interacting bad data via power system decomposition," IEEE Trans. Power Syst., vol. 11, no. 3, pp. 1555-1563, Aug. 1996. (Pubitemid 126781311)
    • (1996) IEEE Transactions on Power Systems , vol.11 , Issue.3 , pp. 1555-1563
    • Cheniae, M.G.1    Mili, L.2
  • 29
    • 84857951113 scopus 로고    scopus 로고
    • Topology perturbation for detecting malicious data injection
    • Jan.
    • K. Morrow, E. Heine, K. Rogers, R. Bobba, and T. Overbye, "Topology perturbation for detecting malicious data injection," in Proc. 45th HICSS, Jan. 2012, pp. 2104-2113.
    • (2012) Proc. 45th HICSS , pp. 2104-2113
    • Morrow, K.1    Heine, E.2    Rogers, K.3    Bobba, R.4    Overbye, T.5
  • 30
    • 84855846298 scopus 로고    scopus 로고
    • Distributed joint cyber attack detection and state recovery in smart grids
    • Oct.
    • A. Tajer, S. Kar, H. Poor, and S. Cui, "Distributed joint cyber attack detection and state recovery in smart grids," in Proc. IEEE Int. Conf. Smart Grid Commun., Oct. 2011, pp. 202-207.
    • (2011) Proc. IEEE Int. Conf. Smart Grid Commun. , pp. 202-207
    • Tajer, A.1    Kar, S.2    Poor, H.3    Cui, S.4
  • 31
    • 79957813416 scopus 로고    scopus 로고
    • Defending false data injection attack on smart grid network using adaptive CUSUM test
    • Mar.
    • Y. Huang, H. Li, K. Campbell, and Z. Han, "Defending false data injection attack on smart grid network using adaptive CUSUM test," in Proc. 45th Annu. CISS, Mar. 2011, pp. 1-6.
    • (2011) Proc. 45th Annu. CISS , pp. 1-6
    • Huang, Y.1    Li, H.2    Campbell, K.3    Han, Z.4
  • 32
    • 85032751507 scopus 로고    scopus 로고
    • Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions
    • Sep.
    • S. Cui et al., "Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions," IEEE Signal Process. Mag., vol. 29, no. 5, pp. 106-115, Sep. 2012.
    • (2012) IEEE Signal Process. Mag. , vol.29 , Issue.5 , pp. 106-115
    • Cui, S.1
  • 33
    • 84872133588 scopus 로고    scopus 로고
    • Bad data injection in smart grid: Attack and defense mechanisms
    • Jan.
    • Y. Huang et al., "Bad data injection in smart grid: Attack and defense mechanisms," IEEE Commun. Mag., vol. 51, no. 1, pp. 27-33, Jan. 2013.
    • (2013) IEEE Commun. Mag. , vol.51 , Issue.1 , pp. 27-33
    • Huang, Y.1
  • 34
    • 84879501033 scopus 로고    scopus 로고
    • Electric Power Research Institute, Palo Alto, CA, USA, May white paper
    • Accuracy of Digital Electricity Meters, Electric Power Research Institute, Palo Alto, CA, USA, May 2010, white paper.
    • (2010) Accuracy of Digital Electricity Meters
  • 35
    • 0030197678 scopus 로고    scopus 로고
    • A new approach to the minimum cut problem
    • D. R. Karger and C. Stein, "A new approach to theminimum cut problem," J. ACM, vol. 43, no. 4, pp. 601-640, Jul. 1996. (Pubitemid 126582607)
    • (1996) Journal of the ACM , vol.43 , Issue.4 , pp. 601-640
    • Karger, D.R.1    Stein, C.2
  • 36
    • 4344657727 scopus 로고    scopus 로고
    • [Online]. Available
    • Power Systems Test Case Archive. [Online]. Available: http://www.ee.washington.edu/research/pstca/
    • Power Systems Test Case Archive


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.