Protection Against False Data Injection Attacks Considering Degrees of Freedom in Attack Vectors
In a false data injection attack to compromise the results of state estimation, the attacker intends to alter the meter readings communicated to the control center to his/her desired values to realize an objective. However, to avoid detection, the manipulated readings should not violate physical law...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on smart grid 2021-11, Vol.12 (6), p.5258-5267 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 5267 |
---|---|
container_issue | 6 |
container_start_page | 5258 |
container_title | IEEE transactions on smart grid |
container_volume | 12 |
creator | Sreeram, T. S. Krishna, S. |
description | In a false data injection attack to compromise the results of state estimation, the attacker intends to alter the meter readings communicated to the control center to his/her desired values to realize an objective. However, to avoid detection, the manipulated readings should not violate physical laws. Therefore, even if an attacker is able to attack a set of meters, he/she may not be able to inject an arbitrary magnitude of attack into all meters of this set. In this paper, we study the degrees of freedom in the attack vectors available to the attacker; higher degrees of freedom pose a higher risk to the utility. We propose an algorithm to determine the degrees of freedom in attack vectors and a method to find the set of meters to be secured in order to minimize the degrees of freedom in all attack vectors. Our results show that a significant reduction in degrees of freedom in all attack vectors is possible by securing a small set of meters. |
doi_str_mv | 10.1109/TSG.2021.3093498 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_ieee_primary_9467272</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9467272</ieee_id><sourcerecordid>2583640005</sourcerecordid><originalsourceid>FETCH-LOGICAL-c291t-1cd3291b1289dcf9a83b03d8648bee301d176637808dccd06f744fc6fbacb2653</originalsourceid><addsrcrecordid>eNo9kM1LAzEQxYMoWGrvgpeA59Yks80mx9LaWigoWL3GbJItW-2mJunB_94s_ZjLPJj3ZpgfQveUjCgl8mn9vhgxwugIiIRCiivUo7KQQyCcXl_0GG7RIMYtyQUAnMke-noLPjmTGt_iyUY3bUx4rn-iwzOdNF622_MwJW2-I576NjbWhabd4JnbBOci9jWeZ2H9DjdnJ_7MQR_iHbqpu32DU--jj_nzevoyXL0ultPJamiYpGlIjYUsKsqEtKaWWkBFwApeiMo5INTSknMoBRHWGEt4XRZFbXhdaVMxPoY-ejzu3Qf_e3Axqa0_hDafVGwsgBf56c5Fji4TfIzB1Wofmp0Of4oS1aFUGaXqUKoTyhx5OEYa59zFLgtespLBP7TVbwk</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2583640005</pqid></control><display><type>article</type><title>Protection Against False Data Injection Attacks Considering Degrees of Freedom in Attack Vectors</title><source>IEEE Electronic Library (IEL)</source><creator>Sreeram, T. S. ; Krishna, S.</creator><creatorcontrib>Sreeram, T. S. ; Krishna, S.</creatorcontrib><description>In a false data injection attack to compromise the results of state estimation, the attacker intends to alter the meter readings communicated to the control center to his/her desired values to realize an objective. However, to avoid detection, the manipulated readings should not violate physical laws. Therefore, even if an attacker is able to attack a set of meters, he/she may not be able to inject an arbitrary magnitude of attack into all meters of this set. In this paper, we study the degrees of freedom in the attack vectors available to the attacker; higher degrees of freedom pose a higher risk to the utility. We propose an algorithm to determine the degrees of freedom in attack vectors and a method to find the set of meters to be secured in order to minimize the degrees of freedom in all attack vectors. Our results show that a significant reduction in degrees of freedom in all attack vectors is possible by securing a small set of meters.</description><identifier>ISSN: 1949-3053</identifier><identifier>EISSN: 1949-3061</identifier><identifier>DOI: 10.1109/TSG.2021.3093498</identifier><identifier>CODEN: ITSGBQ</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Algorithms ; basic measurement set ; cyber security ; Cyberattack ; Degrees of freedom ; False data injection attack ; Indexes ; Mathematical model ; Meters ; Power systems ; sparse attack vectors ; State estimation ; Video surveillance</subject><ispartof>IEEE transactions on smart grid, 2021-11, Vol.12 (6), p.5258-5267</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c291t-1cd3291b1289dcf9a83b03d8648bee301d176637808dccd06f744fc6fbacb2653</citedby><cites>FETCH-LOGICAL-c291t-1cd3291b1289dcf9a83b03d8648bee301d176637808dccd06f744fc6fbacb2653</cites><orcidid>0000-0002-5586-3351 ; 0000-0003-4551-7508</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9467272$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9467272$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Sreeram, T. S.</creatorcontrib><creatorcontrib>Krishna, S.</creatorcontrib><title>Protection Against False Data Injection Attacks Considering Degrees of Freedom in Attack Vectors</title><title>IEEE transactions on smart grid</title><addtitle>TSG</addtitle><description>In a false data injection attack to compromise the results of state estimation, the attacker intends to alter the meter readings communicated to the control center to his/her desired values to realize an objective. However, to avoid detection, the manipulated readings should not violate physical laws. Therefore, even if an attacker is able to attack a set of meters, he/she may not be able to inject an arbitrary magnitude of attack into all meters of this set. In this paper, we study the degrees of freedom in the attack vectors available to the attacker; higher degrees of freedom pose a higher risk to the utility. We propose an algorithm to determine the degrees of freedom in attack vectors and a method to find the set of meters to be secured in order to minimize the degrees of freedom in all attack vectors. Our results show that a significant reduction in degrees of freedom in all attack vectors is possible by securing a small set of meters.</description><subject>Algorithms</subject><subject>basic measurement set</subject><subject>cyber security</subject><subject>Cyberattack</subject><subject>Degrees of freedom</subject><subject>False data injection attack</subject><subject>Indexes</subject><subject>Mathematical model</subject><subject>Meters</subject><subject>Power systems</subject><subject>sparse attack vectors</subject><subject>State estimation</subject><subject>Video surveillance</subject><issn>1949-3053</issn><issn>1949-3061</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kM1LAzEQxYMoWGrvgpeA59Yks80mx9LaWigoWL3GbJItW-2mJunB_94s_ZjLPJj3ZpgfQveUjCgl8mn9vhgxwugIiIRCiivUo7KQQyCcXl_0GG7RIMYtyQUAnMke-noLPjmTGt_iyUY3bUx4rn-iwzOdNF622_MwJW2-I576NjbWhabd4JnbBOci9jWeZ2H9DjdnJ_7MQR_iHbqpu32DU--jj_nzevoyXL0ultPJamiYpGlIjYUsKsqEtKaWWkBFwApeiMo5INTSknMoBRHWGEt4XRZFbXhdaVMxPoY-ejzu3Qf_e3Axqa0_hDafVGwsgBf56c5Fji4TfIzB1Wofmp0Of4oS1aFUGaXqUKoTyhx5OEYa59zFLgtespLBP7TVbwk</recordid><startdate>20211101</startdate><enddate>20211101</enddate><creator>Sreeram, T. S.</creator><creator>Krishna, S.</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>KR7</scope><scope>L7M</scope><orcidid>https://orcid.org/0000-0002-5586-3351</orcidid><orcidid>https://orcid.org/0000-0003-4551-7508</orcidid></search><sort><creationdate>20211101</creationdate><title>Protection Against False Data Injection Attacks Considering Degrees of Freedom in Attack Vectors</title><author>Sreeram, T. S. ; Krishna, S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c291t-1cd3291b1289dcf9a83b03d8648bee301d176637808dccd06f744fc6fbacb2653</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Algorithms</topic><topic>basic measurement set</topic><topic>cyber security</topic><topic>Cyberattack</topic><topic>Degrees of freedom</topic><topic>False data injection attack</topic><topic>Indexes</topic><topic>Mathematical model</topic><topic>Meters</topic><topic>Power systems</topic><topic>sparse attack vectors</topic><topic>State estimation</topic><topic>Video surveillance</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Sreeram, T. S.</creatorcontrib><creatorcontrib>Krishna, S.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Electronics & Communications Abstracts</collection><collection>Mechanical & Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>IEEE transactions on smart grid</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Sreeram, T. S.</au><au>Krishna, S.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Protection Against False Data Injection Attacks Considering Degrees of Freedom in Attack Vectors</atitle><jtitle>IEEE transactions on smart grid</jtitle><stitle>TSG</stitle><date>2021-11-01</date><risdate>2021</risdate><volume>12</volume><issue>6</issue><spage>5258</spage><epage>5267</epage><pages>5258-5267</pages><issn>1949-3053</issn><eissn>1949-3061</eissn><coden>ITSGBQ</coden><abstract>In a false data injection attack to compromise the results of state estimation, the attacker intends to alter the meter readings communicated to the control center to his/her desired values to realize an objective. However, to avoid detection, the manipulated readings should not violate physical laws. Therefore, even if an attacker is able to attack a set of meters, he/she may not be able to inject an arbitrary magnitude of attack into all meters of this set. In this paper, we study the degrees of freedom in the attack vectors available to the attacker; higher degrees of freedom pose a higher risk to the utility. We propose an algorithm to determine the degrees of freedom in attack vectors and a method to find the set of meters to be secured in order to minimize the degrees of freedom in all attack vectors. Our results show that a significant reduction in degrees of freedom in all attack vectors is possible by securing a small set of meters.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/TSG.2021.3093498</doi><tpages>10</tpages><orcidid>https://orcid.org/0000-0002-5586-3351</orcidid><orcidid>https://orcid.org/0000-0003-4551-7508</orcidid></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1949-3053 |
ispartof | IEEE transactions on smart grid, 2021-11, Vol.12 (6), p.5258-5267 |
issn | 1949-3053 1949-3061 |
language | eng |
recordid | cdi_ieee_primary_9467272 |
source | IEEE Electronic Library (IEL) |
subjects | Algorithms basic measurement set cyber security Cyberattack Degrees of freedom False data injection attack Indexes Mathematical model Meters Power systems sparse attack vectors State estimation Video surveillance |
title | Protection Against False Data Injection Attacks Considering Degrees of Freedom in Attack Vectors |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-15T06%3A03%3A25IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Protection%20Against%20False%20Data%20Injection%20Attacks%20Considering%20Degrees%20of%20Freedom%20in%20Attack%20Vectors&rft.jtitle=IEEE%20transactions%20on%20smart%20grid&rft.au=Sreeram,%20T.%20S.&rft.date=2021-11-01&rft.volume=12&rft.issue=6&rft.spage=5258&rft.epage=5267&rft.pages=5258-5267&rft.issn=1949-3053&rft.eissn=1949-3061&rft.coden=ITSGBQ&rft_id=info:doi/10.1109/TSG.2021.3093498&rft_dat=%3Cproquest_RIE%3E2583640005%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2583640005&rft_id=info:pmid/&rft_ieee_id=9467272&rfr_iscdi=true |