SlideShare a Scribd company logo
ON FALSE DATA-INJECTION ATTACKS AGAINST POWER SYSTEM 
STATE ESTIMATION: MODELING AND COUNTERMEASURES 
ABSTRACT: 
It is critical for a power system to estimate its operation state based on meter measurements in 
the field and the configuration of power grid networks. Recent studies show that the adversary 
can bypass the existing bad data detection schemes,posing dangerous threats to the operation of 
power grid systems. Nevertheless, two critical issues remain open: 1) how can an adversary 
choose the meters to compromise to cause the most significant deviation of the system state 
estimation, and 2) how can a system operator defend against such attacks? To address these 
issues, we first study the problem of finding the optimal attack strategy—i.e., a data-injection 
attacking strategy that selects a set of meters to manipulate so as to cause the maximum damage. 
We formalize the problem and develop efficient algorithms to identify the optimal meter set. We 
implement and test our attack strategy on various IEEE standard bus systems, and demonstrate 
its superiority over a baseline strategy of random selections. To defend against false data-injection 
attacks, we propose a protection-based defense and a detection-based defense, 
respectively. For the protection-based defense, we identify and protect critical sensors and make 
the system more resilient to attacks. For the detection-based defense, we develop the spatial-based 
and temporal-based detection schemes to accurately identify data-injection attacks.
EXISTING SYSTEM: 
State estimation has been widely used by Energy Management Systems (EMS) at the control 
center to ensure that the power grid is running in desired states. It provides the estimation of 
system states in real time based on meter measurements in the field. The meter measurements are 
collected by the Supervisory Control and Data Acquisition (SCADA) Systems and processed by 
a state estimator to filter the measurement noise and to detect gross errors. The results of state 
estimation are then used by applications at the control center, for purposes such as contingency 
analysis, optimal power flow, economic dispatch, and others. 
One can see that state estimation plays a critical role in the stability of power grid systems. Meter 
measurements collected via the SCADA system contain not only measurement noise due to the 
finite accuracy of meters and communication media, but also errors caused by various issues for 
example, meters with faulty connection and calibration. 
To reduce the impact of noise and errors, power system researchers have developed numerous 
methods to process meter measurements after the state estimation process. The essential goal of 
these methods is to leverage the redundancy of multiple measurements to identify and remove 
anomalies. While most existing techniques for protecting power grid systems were designed to 
ensure system reliability (i.e.,against random failures), recently there have been growing 
concerns in smart grid initiatives on the protection against malicious cyber attacks . There are 
growing concerns in the smart grid on protection against malicious cyber threats and the 
operation and control of smart grid depend on a complex cyberspace of computers, software, and 
communication technologies. Because the measurement component supported by smart 
equipment (e.g., smart meters and sensors) plays an important role, it can be a target for attacks. 
As those measuring devices may be connected through open network interfaces and lacking 
tamper-resistance hardware increases the possibility of being compromised by the adversary.
DISADVANTAGES OF EXISTING SYSTEM: 
1. The adversary can inject false measurement reports to the controller. This causes the 
controller to estimate wrong system states, posing dangerous threats to the operation of the 
power grid system. 
2. If the controller to estimates wrong system states, posing dangerous threats to the operation of 
the power grid system. 
PROPOSED SYSTEM: 
In this paper, we study a novel problem of defending against false data-injection attacks from the 
system operator’s point of view. Because most adversaries are limited in the amount of resources 
they possess, we first consider a least-effort attack model—i.e., the objective of the adversary is 
to identify the minimum number of meters that one has to manipulate to change a predetermined 
number of state variables (so as to launch a false data-injection attack accordingly). 
We prove the NP-hardness of this problem by reduction from the minimum sub additive join 
problem. To address this problem in a practical setting, we develop a linear transformation-based 
approach, which finds the optimal solution through the matrix transformation. Nevertheless, the 
computation complexity of the matrix transformation grows exponentially with the size of the 
power network. To address this issue, we develop a heuristic yet extremely efficient approach. 
Specifically, through the analysis of the H matrix, for a set of bus state variables, the adversary 
needs to compromise less meters when the buses are connected to one another with the largest 
degrees and connected to the least number of buses beyond its area. Based on this insight, we 
divide the network into a number of overlapping areas. The linear transformation or brute-force 
search (BF) can be used to identify the optimal set of meters for individual small areas and then 
derive the set of meters for the whole network.
We have implemented our proposed heuristic-based approach on power system state 
manipulation on various IEEE standard buses. Our extensive experimental data validate the 
feasibility and effectiveness of the developed approach. 
ADVANTAGES OF PROPOSED SYSTEM: 
1. The spatial-based detection algorithm is able to recognize at least 95 percent of the false data-injection 
attacks once the attack changes more than 6 percent of the state variable values 
2. The temporal-based detection algorithm can identify the compromised meters that send 
manipulated measurements quickly. 
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
 System : Pentium IV 2.4 GHz. 
 Hard Disk : 40 GB. 
 Floppy Drive : 1.44 Mb. 
 Monitor : 15 VGA Colour. 
 Mouse : Logitech. 
 Ram : 512 Mb.
SOFTWARE REQUIREMENTS: 
 Operating system : Windows XP/7. 
 Coding Language : JAVA/J2EE 
 IDE : Netbeans 7.4 
 Database : MYSQL 
REFERENCE: 
Qingyu Yang, Member, IEEE, Jie Yang, Wei Yu, Dou An,Nan Zhang, and Wei Zhao, Fellow, 
IEEE”On False Data-Injection Attacks against Power System State Estimation: Modeling 
and Countermeasures”IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED 
SYSTEMS, VOL. 25,NO. 3,MARCH 2014.
On false data injection attacks against power system
On false data injection attacks against power system

More Related Content

DOCX
JPJ1439 On False Data-Injection Attacks against Power System State Estimation...
DOCX
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
DOCX
on false data-injection attacks against power system state estimation modelin...
PDF
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
PDF
Afa wea
PDF
Technical paper 6_2
PDF
On-line Power System Static Security Assessment in a Distributed Computing Fr...
PDF
Wide area protection-and_emergency_control (1)
JPJ1439 On False Data-Injection Attacks against Power System State Estimation...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
on false data-injection attacks against power system state estimation modelin...
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
Afa wea
Technical paper 6_2
On-line Power System Static Security Assessment in a Distributed Computing Fr...
Wide area protection-and_emergency_control (1)

What's hot (17)

PDF
Wide area protection-research_in_the_smart_grid
DOCX
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...
DOC
Model based , real time control
PPTX
Root cause analysis in complex cyber physical systems - Faults Classification
PDF
IMPROVEMENT OF FALSE REPORT DETECTION PERFORMANCE BASED ON INVALID DATA DETEC...
PPT
DETECTION OF MALICIOUS EXECUTABLES USING RULE BASED CLASSIFICATION ALGORITHMS
DOCX
JPD1424 A System for Denial-of-Service Attack Detection Based on Multivariat...
PDF
23 9754 assessment paper id 0023 (ed l)2
PPTX
PPT
Multisensor data fusion for defense application
PDF
Application of hybrid real time simulator
PPT
Short-term Load Forecasting based on Neural network and Local RegressionJie
PPTX
IEEE SSCI 2011 Talk - Neural Networks Ensembles for Short-Term Load Forecasting
PPTX
Study of Cyber-Security on Load Frequency Control in Power System
PDF
A Survey of Fault Tolerance Methods in Wireless Sensor Networks
PDF
Approaches to integrated malware detection and avoidance
Wide area protection-research_in_the_smart_grid
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...
Model based , real time control
Root cause analysis in complex cyber physical systems - Faults Classification
IMPROVEMENT OF FALSE REPORT DETECTION PERFORMANCE BASED ON INVALID DATA DETEC...
DETECTION OF MALICIOUS EXECUTABLES USING RULE BASED CLASSIFICATION ALGORITHMS
JPD1424 A System for Denial-of-Service Attack Detection Based on Multivariat...
23 9754 assessment paper id 0023 (ed l)2
Multisensor data fusion for defense application
Application of hybrid real time simulator
Short-term Load Forecasting based on Neural network and Local RegressionJie
IEEE SSCI 2011 Talk - Neural Networks Ensembles for Short-Term Load Forecasting
Study of Cyber-Security on Load Frequency Control in Power System
A Survey of Fault Tolerance Methods in Wireless Sensor Networks
Approaches to integrated malware detection and avoidance
Ad

Similar to On false data injection attacks against power system (20)

DOCX
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
PDF
Safeguard the Automatic Generation Control using Game Theory Technique
PDF
Counter Counter-Measures against Stealth Attacks on State Estimation in Smart...
PDF
Irjet v7 i3475
PDF
PDF
IRJET- False Data Injection Attacks in Insider Attack
PDF
Poster
PPTX
CYBER SECURITY IN THE SMART GRID
PPTX
Presentation1 160729072733
PDF
Efficient detection of faults and false data injection attacks in smart grid ...
PDF
Overview of State Estimation Technique for Power System Control
PDF
IEC 61850-9-2 based module for state estimation in co-simulated power grids
PDF
A new linear quadratic regulator model to mitigate frequency disturbances in...
PDF
State Estimation of Power System with Interline Power Flow Controller
PDF
Smart Grid Resilience Issues & Enhancements
PDF
Power system state estimation using teaching learning-based optimization algo...
PDF
Multiple Constraints Consideration in Power System State Estimation
PDF
Phase Measurement Units based FACT’s Devices for the Improvement of Power Sys...
PPTX
Attack detection and prevention in the cyber
PDF
designdesigndesigndesigns-05-00052-v2.pdf
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
Safeguard the Automatic Generation Control using Game Theory Technique
Counter Counter-Measures against Stealth Attacks on State Estimation in Smart...
Irjet v7 i3475
IRJET- False Data Injection Attacks in Insider Attack
Poster
CYBER SECURITY IN THE SMART GRID
Presentation1 160729072733
Efficient detection of faults and false data injection attacks in smart grid ...
Overview of State Estimation Technique for Power System Control
IEC 61850-9-2 based module for state estimation in co-simulated power grids
A new linear quadratic regulator model to mitigate frequency disturbances in...
State Estimation of Power System with Interline Power Flow Controller
Smart Grid Resilience Issues & Enhancements
Power system state estimation using teaching learning-based optimization algo...
Multiple Constraints Consideration in Power System State Estimation
Phase Measurement Units based FACT’s Devices for the Improvement of Power Sys...
Attack detection and prevention in the cyber
designdesigndesigndesigns-05-00052-v2.pdf
Ad

More from Shakas Technologies (20)

DOCX
A Review on Deep-Learning-Based Cyberbullying Detection
DOCX
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
DOCX
A Novel Framework for Credit Card.
DOCX
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
DOCX
NS2 Final Year Project Titles 2023- 2024
DOCX
MATLAB Final Year IEEE Project Titles 2023-2024
DOCX
Latest Python IEEE Project Titles 2023-2024
DOCX
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
DOCX
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
DOCX
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
DOCX
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
DOCX
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
DOCX
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
DOCX
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
DOCX
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
DOCX
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
DOCX
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
DOCX
Fighting Money Laundering With Statistics and Machine Learning.docx
DOCX
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
DOCX
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
A Review on Deep-Learning-Based Cyberbullying Detection
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Novel Framework for Credit Card.
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
NS2 Final Year Project Titles 2023- 2024
MATLAB Final Year IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Fighting Money Laundering With Statistics and Machine Learning.docx
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...

Recently uploaded (20)

PDF
Insiders guide to clinical Medicine.pdf
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
01-Introduction-to-Information-Management.pdf
PPTX
GDM (1) (1).pptx small presentation for students
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
Pre independence Education in Inndia.pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Complications of Minimal Access Surgery at WLH
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PPTX
Cell Structure & Organelles in detailed.
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
Insiders guide to clinical Medicine.pdf
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
human mycosis Human fungal infections are called human mycosis..pptx
01-Introduction-to-Information-Management.pdf
GDM (1) (1).pptx small presentation for students
Final Presentation General Medicine 03-08-2024.pptx
O5-L3 Freight Transport Ops (International) V1.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPH.pptx obstetrics and gynecology in nursing
Pre independence Education in Inndia.pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
Complications of Minimal Access Surgery at WLH
Microbial disease of the cardiovascular and lymphatic systems
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Cell Structure & Organelles in detailed.
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
TR - Agricultural Crops Production NC III.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra

On false data injection attacks against power system

  • 1. ON FALSE DATA-INJECTION ATTACKS AGAINST POWER SYSTEM STATE ESTIMATION: MODELING AND COUNTERMEASURES ABSTRACT: It is critical for a power system to estimate its operation state based on meter measurements in the field and the configuration of power grid networks. Recent studies show that the adversary can bypass the existing bad data detection schemes,posing dangerous threats to the operation of power grid systems. Nevertheless, two critical issues remain open: 1) how can an adversary choose the meters to compromise to cause the most significant deviation of the system state estimation, and 2) how can a system operator defend against such attacks? To address these issues, we first study the problem of finding the optimal attack strategy—i.e., a data-injection attacking strategy that selects a set of meters to manipulate so as to cause the maximum damage. We formalize the problem and develop efficient algorithms to identify the optimal meter set. We implement and test our attack strategy on various IEEE standard bus systems, and demonstrate its superiority over a baseline strategy of random selections. To defend against false data-injection attacks, we propose a protection-based defense and a detection-based defense, respectively. For the protection-based defense, we identify and protect critical sensors and make the system more resilient to attacks. For the detection-based defense, we develop the spatial-based and temporal-based detection schemes to accurately identify data-injection attacks.
  • 2. EXISTING SYSTEM: State estimation has been widely used by Energy Management Systems (EMS) at the control center to ensure that the power grid is running in desired states. It provides the estimation of system states in real time based on meter measurements in the field. The meter measurements are collected by the Supervisory Control and Data Acquisition (SCADA) Systems and processed by a state estimator to filter the measurement noise and to detect gross errors. The results of state estimation are then used by applications at the control center, for purposes such as contingency analysis, optimal power flow, economic dispatch, and others. One can see that state estimation plays a critical role in the stability of power grid systems. Meter measurements collected via the SCADA system contain not only measurement noise due to the finite accuracy of meters and communication media, but also errors caused by various issues for example, meters with faulty connection and calibration. To reduce the impact of noise and errors, power system researchers have developed numerous methods to process meter measurements after the state estimation process. The essential goal of these methods is to leverage the redundancy of multiple measurements to identify and remove anomalies. While most existing techniques for protecting power grid systems were designed to ensure system reliability (i.e.,against random failures), recently there have been growing concerns in smart grid initiatives on the protection against malicious cyber attacks . There are growing concerns in the smart grid on protection against malicious cyber threats and the operation and control of smart grid depend on a complex cyberspace of computers, software, and communication technologies. Because the measurement component supported by smart equipment (e.g., smart meters and sensors) plays an important role, it can be a target for attacks. As those measuring devices may be connected through open network interfaces and lacking tamper-resistance hardware increases the possibility of being compromised by the adversary.
  • 3. DISADVANTAGES OF EXISTING SYSTEM: 1. The adversary can inject false measurement reports to the controller. This causes the controller to estimate wrong system states, posing dangerous threats to the operation of the power grid system. 2. If the controller to estimates wrong system states, posing dangerous threats to the operation of the power grid system. PROPOSED SYSTEM: In this paper, we study a novel problem of defending against false data-injection attacks from the system operator’s point of view. Because most adversaries are limited in the amount of resources they possess, we first consider a least-effort attack model—i.e., the objective of the adversary is to identify the minimum number of meters that one has to manipulate to change a predetermined number of state variables (so as to launch a false data-injection attack accordingly). We prove the NP-hardness of this problem by reduction from the minimum sub additive join problem. To address this problem in a practical setting, we develop a linear transformation-based approach, which finds the optimal solution through the matrix transformation. Nevertheless, the computation complexity of the matrix transformation grows exponentially with the size of the power network. To address this issue, we develop a heuristic yet extremely efficient approach. Specifically, through the analysis of the H matrix, for a set of bus state variables, the adversary needs to compromise less meters when the buses are connected to one another with the largest degrees and connected to the least number of buses beyond its area. Based on this insight, we divide the network into a number of overlapping areas. The linear transformation or brute-force search (BF) can be used to identify the optimal set of meters for individual small areas and then derive the set of meters for the whole network.
  • 4. We have implemented our proposed heuristic-based approach on power system state manipulation on various IEEE standard buses. Our extensive experimental data validate the feasibility and effectiveness of the developed approach. ADVANTAGES OF PROPOSED SYSTEM: 1. The spatial-based detection algorithm is able to recognize at least 95 percent of the false data-injection attacks once the attack changes more than 6 percent of the state variable values 2. The temporal-based detection algorithm can identify the compromised meters that send manipulated measurements quickly. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb.
  • 5. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : JAVA/J2EE  IDE : Netbeans 7.4  Database : MYSQL REFERENCE: Qingyu Yang, Member, IEEE, Jie Yang, Wei Yu, Dou An,Nan Zhang, and Wei Zhao, Fellow, IEEE”On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures”IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 25,NO. 3,MARCH 2014.