Protection Against False Data Injection Attacks Considering Degrees of Freedom in Attack Vectors

In a false data injection attack to compromise the results of state estimation, the attacker intends to alter the meter readings communicated to the control center to his/her desired values to realize an objective. However, to avoid detection, the manipulated readings should not violate physical law...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on smart grid 2021-11, Vol.12 (6), p.5258-5267
Hauptverfasser: Sreeram, T. S., Krishna, S.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 5267
container_issue 6
container_start_page 5258
container_title IEEE transactions on smart grid
container_volume 12
creator Sreeram, T. S.
Krishna, S.
description In a false data injection attack to compromise the results of state estimation, the attacker intends to alter the meter readings communicated to the control center to his/her desired values to realize an objective. However, to avoid detection, the manipulated readings should not violate physical laws. Therefore, even if an attacker is able to attack a set of meters, he/she may not be able to inject an arbitrary magnitude of attack into all meters of this set. In this paper, we study the degrees of freedom in the attack vectors available to the attacker; higher degrees of freedom pose a higher risk to the utility. We propose an algorithm to determine the degrees of freedom in attack vectors and a method to find the set of meters to be secured in order to minimize the degrees of freedom in all attack vectors. Our results show that a significant reduction in degrees of freedom in all attack vectors is possible by securing a small set of meters.
doi_str_mv 10.1109/TSG.2021.3093498
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_ieee_primary_9467272</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9467272</ieee_id><sourcerecordid>2583640005</sourcerecordid><originalsourceid>FETCH-LOGICAL-c291t-1cd3291b1289dcf9a83b03d8648bee301d176637808dccd06f744fc6fbacb2653</originalsourceid><addsrcrecordid>eNo9kM1LAzEQxYMoWGrvgpeA59Yks80mx9LaWigoWL3GbJItW-2mJunB_94s_ZjLPJj3ZpgfQveUjCgl8mn9vhgxwugIiIRCiivUo7KQQyCcXl_0GG7RIMYtyQUAnMke-noLPjmTGt_iyUY3bUx4rn-iwzOdNF622_MwJW2-I576NjbWhabd4JnbBOci9jWeZ2H9DjdnJ_7MQR_iHbqpu32DU--jj_nzevoyXL0ultPJamiYpGlIjYUsKsqEtKaWWkBFwApeiMo5INTSknMoBRHWGEt4XRZFbXhdaVMxPoY-ejzu3Qf_e3Axqa0_hDafVGwsgBf56c5Fji4TfIzB1Wofmp0Of4oS1aFUGaXqUKoTyhx5OEYa59zFLgtespLBP7TVbwk</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2583640005</pqid></control><display><type>article</type><title>Protection Against False Data Injection Attacks Considering Degrees of Freedom in Attack Vectors</title><source>IEEE Electronic Library (IEL)</source><creator>Sreeram, T. S. ; Krishna, S.</creator><creatorcontrib>Sreeram, T. S. ; Krishna, S.</creatorcontrib><description>In a false data injection attack to compromise the results of state estimation, the attacker intends to alter the meter readings communicated to the control center to his/her desired values to realize an objective. However, to avoid detection, the manipulated readings should not violate physical laws. Therefore, even if an attacker is able to attack a set of meters, he/she may not be able to inject an arbitrary magnitude of attack into all meters of this set. In this paper, we study the degrees of freedom in the attack vectors available to the attacker; higher degrees of freedom pose a higher risk to the utility. We propose an algorithm to determine the degrees of freedom in attack vectors and a method to find the set of meters to be secured in order to minimize the degrees of freedom in all attack vectors. Our results show that a significant reduction in degrees of freedom in all attack vectors is possible by securing a small set of meters.</description><identifier>ISSN: 1949-3053</identifier><identifier>EISSN: 1949-3061</identifier><identifier>DOI: 10.1109/TSG.2021.3093498</identifier><identifier>CODEN: ITSGBQ</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Algorithms ; basic measurement set ; cyber security ; Cyberattack ; Degrees of freedom ; False data injection attack ; Indexes ; Mathematical model ; Meters ; Power systems ; sparse attack vectors ; State estimation ; Video surveillance</subject><ispartof>IEEE transactions on smart grid, 2021-11, Vol.12 (6), p.5258-5267</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c291t-1cd3291b1289dcf9a83b03d8648bee301d176637808dccd06f744fc6fbacb2653</citedby><cites>FETCH-LOGICAL-c291t-1cd3291b1289dcf9a83b03d8648bee301d176637808dccd06f744fc6fbacb2653</cites><orcidid>0000-0002-5586-3351 ; 0000-0003-4551-7508</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9467272$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9467272$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Sreeram, T. S.</creatorcontrib><creatorcontrib>Krishna, S.</creatorcontrib><title>Protection Against False Data Injection Attacks Considering Degrees of Freedom in Attack Vectors</title><title>IEEE transactions on smart grid</title><addtitle>TSG</addtitle><description>In a false data injection attack to compromise the results of state estimation, the attacker intends to alter the meter readings communicated to the control center to his/her desired values to realize an objective. However, to avoid detection, the manipulated readings should not violate physical laws. Therefore, even if an attacker is able to attack a set of meters, he/she may not be able to inject an arbitrary magnitude of attack into all meters of this set. In this paper, we study the degrees of freedom in the attack vectors available to the attacker; higher degrees of freedom pose a higher risk to the utility. We propose an algorithm to determine the degrees of freedom in attack vectors and a method to find the set of meters to be secured in order to minimize the degrees of freedom in all attack vectors. Our results show that a significant reduction in degrees of freedom in all attack vectors is possible by securing a small set of meters.</description><subject>Algorithms</subject><subject>basic measurement set</subject><subject>cyber security</subject><subject>Cyberattack</subject><subject>Degrees of freedom</subject><subject>False data injection attack</subject><subject>Indexes</subject><subject>Mathematical model</subject><subject>Meters</subject><subject>Power systems</subject><subject>sparse attack vectors</subject><subject>State estimation</subject><subject>Video surveillance</subject><issn>1949-3053</issn><issn>1949-3061</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kM1LAzEQxYMoWGrvgpeA59Yks80mx9LaWigoWL3GbJItW-2mJunB_94s_ZjLPJj3ZpgfQveUjCgl8mn9vhgxwugIiIRCiivUo7KQQyCcXl_0GG7RIMYtyQUAnMke-noLPjmTGt_iyUY3bUx4rn-iwzOdNF622_MwJW2-I576NjbWhabd4JnbBOci9jWeZ2H9DjdnJ_7MQR_iHbqpu32DU--jj_nzevoyXL0ultPJamiYpGlIjYUsKsqEtKaWWkBFwApeiMo5INTSknMoBRHWGEt4XRZFbXhdaVMxPoY-ejzu3Qf_e3Axqa0_hDafVGwsgBf56c5Fji4TfIzB1Wofmp0Of4oS1aFUGaXqUKoTyhx5OEYa59zFLgtespLBP7TVbwk</recordid><startdate>20211101</startdate><enddate>20211101</enddate><creator>Sreeram, T. S.</creator><creator>Krishna, S.</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>KR7</scope><scope>L7M</scope><orcidid>https://orcid.org/0000-0002-5586-3351</orcidid><orcidid>https://orcid.org/0000-0003-4551-7508</orcidid></search><sort><creationdate>20211101</creationdate><title>Protection Against False Data Injection Attacks Considering Degrees of Freedom in Attack Vectors</title><author>Sreeram, T. S. ; Krishna, S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c291t-1cd3291b1289dcf9a83b03d8648bee301d176637808dccd06f744fc6fbacb2653</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Algorithms</topic><topic>basic measurement set</topic><topic>cyber security</topic><topic>Cyberattack</topic><topic>Degrees of freedom</topic><topic>False data injection attack</topic><topic>Indexes</topic><topic>Mathematical model</topic><topic>Meters</topic><topic>Power systems</topic><topic>sparse attack vectors</topic><topic>State estimation</topic><topic>Video surveillance</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Sreeram, T. S.</creatorcontrib><creatorcontrib>Krishna, S.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>IEEE transactions on smart grid</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Sreeram, T. S.</au><au>Krishna, S.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Protection Against False Data Injection Attacks Considering Degrees of Freedom in Attack Vectors</atitle><jtitle>IEEE transactions on smart grid</jtitle><stitle>TSG</stitle><date>2021-11-01</date><risdate>2021</risdate><volume>12</volume><issue>6</issue><spage>5258</spage><epage>5267</epage><pages>5258-5267</pages><issn>1949-3053</issn><eissn>1949-3061</eissn><coden>ITSGBQ</coden><abstract>In a false data injection attack to compromise the results of state estimation, the attacker intends to alter the meter readings communicated to the control center to his/her desired values to realize an objective. However, to avoid detection, the manipulated readings should not violate physical laws. Therefore, even if an attacker is able to attack a set of meters, he/she may not be able to inject an arbitrary magnitude of attack into all meters of this set. In this paper, we study the degrees of freedom in the attack vectors available to the attacker; higher degrees of freedom pose a higher risk to the utility. We propose an algorithm to determine the degrees of freedom in attack vectors and a method to find the set of meters to be secured in order to minimize the degrees of freedom in all attack vectors. Our results show that a significant reduction in degrees of freedom in all attack vectors is possible by securing a small set of meters.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/TSG.2021.3093498</doi><tpages>10</tpages><orcidid>https://orcid.org/0000-0002-5586-3351</orcidid><orcidid>https://orcid.org/0000-0003-4551-7508</orcidid></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1949-3053
ispartof IEEE transactions on smart grid, 2021-11, Vol.12 (6), p.5258-5267
issn 1949-3053
1949-3061
language eng
recordid cdi_ieee_primary_9467272
source IEEE Electronic Library (IEL)
subjects Algorithms
basic measurement set
cyber security
Cyberattack
Degrees of freedom
False data injection attack
Indexes
Mathematical model
Meters
Power systems
sparse attack vectors
State estimation
Video surveillance
title Protection Against False Data Injection Attacks Considering Degrees of Freedom in Attack Vectors
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-15T06%3A03%3A25IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Protection%20Against%20False%20Data%20Injection%20Attacks%20Considering%20Degrees%20of%20Freedom%20in%20Attack%20Vectors&rft.jtitle=IEEE%20transactions%20on%20smart%20grid&rft.au=Sreeram,%20T.%20S.&rft.date=2021-11-01&rft.volume=12&rft.issue=6&rft.spage=5258&rft.epage=5267&rft.pages=5258-5267&rft.issn=1949-3053&rft.eissn=1949-3061&rft.coden=ITSGBQ&rft_id=info:doi/10.1109/TSG.2021.3093498&rft_dat=%3Cproquest_RIE%3E2583640005%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2583640005&rft_id=info:pmid/&rft_ieee_id=9467272&rfr_iscdi=true