Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

An integrated detection system against false data injection attacks in the Smart Grid

Published: 25 January 2015 Publication History

Abstract

The Smart Grid is a new type of power grid that will use advanced communication network technologies to support more efficient energy transmission and distribution. The grid infrastructure was designed for reliability; but security, especially against cyber threats, is also a critical need. In particular, an adversary can inject false data to disrupt system operation. In this paper, we develop a false data detection system that integrates two techniques that are tailored to the different attack types that we consider. We adopt anomaly-based detection to detect strong attacks that feature the injection of large amounts of spurious measurement data in a very short time. We integrate the anomaly detection mechanism with a watermarking-based detection scheme that prevents more stealthy attacks that involve subtle manipulation of the measurement data. We conduct a theoretical analysis to derive the closed-form formulae for the performance metrics that allow us to investigate the effectiveness of our proposed detection techniques. Our experimental data show that our integrated detection system can accurately detect both strong and stealthy attacks. Copyright © 2014 John Wiley & Sons, Ltd.

References

[1]
Mo Y, Kim T, Brancik K, Dickinson D, Lee H, Perrig A, Sinopoli B. Cyber-physical security of a Smart Grid infrastructure. Proceedings of the IEEE January 2012; Volume 100 Issue 1: pp.1-15.
[2]
Mo Y, Sinopoli B. False data injection attacks in control systems, Preprints of the 1st workshop on Secure Control Systems, CPSWEEK, Stockholm, Sweden, 2010; pp.56-62.
[3]
McLaughlin S, Podkuiko D, McDaniel P. Energy theft in the advanced metering infrastructure. Critical Information Infrastructures Security of Lecture Notes in Computer Science 2010; Volume 6027: pp.176-187.
[4]
Cleveland F. Cyber security issues for advanced metering infrastructure AMI. Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century, Pittsburgh, PA, USA, 2008; pp.1-5.
[5]
Song K, Seo D, Park H, Lee H, Perrig A. Omap: one-way memory attestation protocol for smart meters, Proceedings of 2011 Ninth IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops ISPAW, Busan, South Korea, 2011; pp.111-118.
[6]
Karnouskos S. Stuxnet Worm Impact on Industrial Cyber-Physical System Security, 2011.
[7]
Mashima D, Cardenas AA. Evaluating electricity theft detectors in Smart Grid networks, Proceedings of the 15th International Conference on Research in Attacks, Intrusions, and Defenses RAID, Amsterdam, The Netherlands, 2012; pp.210-229.
[8]
Liu Y, Ning P, Reiter M. False data injection attacks against state estimation in electric power grids, Proceedings of the 16th ACM Conference on Computer and Communications Security, ACM, Chicago, IL, USA, 2009; pp.21-32.
[9]
Lin J, Yu W, Yang X, Xu G, Zhao W. On false data injection attacks against distributed energy routing in Smart Grid, Proceedings of ACM/IEEE Third International Conference on Cyber-Physical Systems ICCPS, Beijing, China, 2012; pp.1-10.
[10]
Wikipedia. Northeast blackout of 2003. Available from: "http://en.wikipedia.org/wiki/Northeast" Blackout of 2003}/ {Accessed on 19 September 2011}.
[11]
Yuan Y, Li Z, Ren K. Modeling load redistribution attacks in power systems. IEEE Transactions on Smart Grid 2011; Volume 2 Issue 2: pp.382-390.
[12]
Houdea S, Todd A, Sudarshan A, Flora JA, Armel KC. Real-time feedback and electricity consumption: a field experiment assessing the potential for savings and persistence. The Energy Journal. International Association for Energy Economics, HighBeam Research 2013: pp.87-103. Available from: "http://www.stanford.edu/group/peec/cgi-bin/docs/behavior/research/FieldExperimentPowermeter_vrevised_May2012_authors_vf_pdf.pdf".
[13]
Stallings W. Network Security Essentials: Applications and Standards, Vol.Volume 2. Prentice Hall: Englewood Cliffs, NJ, USA, 2007.
[14]
Abur A, Exposito A. Power System State Estimation: Theory and Implementation, Vol.Volume 24. CRC, 2004.
[15]
Intrusion detection system, 2013. Available from: "http://webopedia.com/TERM/I/intrusion_detection_system.html".
[16]
Garcia-Teodoro P, Diaz-Verdejo J, Macia-Fernandez G, Vazquez E. Anomaly-based network intrusion detection: techniques, systems and challenges. Computers & Security 2009; Volume 28 Issue 1-2: pp.18-28.
[17]
Yu W, Fu X, Graham S, Xuan D, Zhao W. DSSS-based flow marking technique for invisible traceback, Proceedings of IEEE Symposium on Security and Privacy, Berkeley, CA, USA, 2007; pp.18-32.
[18]
Wang X, Chen S, Jajodia S. Network flow watermarking attack on low-latency anonymous communication systems, IEEE Symp. on Security and Privacy, Berkeley, CA, USA, May 2007; pp.116-130.
[19]
Mills D, <author>Martin Ed, J</author>, Burbank J, Kasch W. Network time protocol version 4:protocol and algorithms specification, RFC 5905, June 2010. Available from: "http://www.rfc-editor.org/rfc/rfc5905.txt".
[20]
IEEE standard for a precision clock synchronization protocol for networked measurement and control systems, IEEE Std 1588-2008 Revision of IEEE Std 1588-2002, 2008; pp.c1-269.
[21]
Jin T, Noubir G, Thapa B. Zero pre-shared secret key establishment in the presence of jammers, Proceedings of the Tenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, New Orleans, LA, USA, 2009; pp.219-228.
[22]
Duda R, Hart P, Stork D. Pattern Classification, ser. Pattern Classification and Scene Analysis: Pattern Classification, John Wiley & Sons, Inc: Hoboken, NJ, USA, 2000.
[23]
Caton PW, Nayuni NK, Murch O, Corder R. Endotoxin induced hyperlactatemia and hypoglycemia is linked to decreased mitochondrial phosphoenolpyruvate carboxykinase. Life Sciences 2009; Volume 84: pp.738-744.
[24]
Ben MG, Yohai VJ. Quantile-quantile plot for deviance residuals in the generalized linear model. Journal of Computational and Graphical Statistics 2004; Volume 13: pp.36-47.
[25]
Yu W, An D, Griffith D, Yang Q, Xu G. On statistical modeling and forecasting of energy usage in Smart Grid. Technical Report 2013-09-001, Department of Computer and Information Science, Towson University, 2013.
[26]
VanTrees H. Detection, Estimation, and Modulation Theory, Part I. John Wiley and Sons, Inc: Hoboken, NJ, USA, 1968.
[27]
Smillie G. Analogue and Digital Communication Techniques. Arnold: London, 1999.
[28]
Cárdenas AA, Amin S, Lin Z-S, Huang Y-L, Huang C-Y, Sastry S. Attacks against process control systems: risk assessment, detection, and response, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, New York, NY, USA, 2011; pp.355-366.
[29]
Cisco. Smart Grid Security Solutions Brief, 2009. Available from: "http://cisco.com/web/strategy/docs/94energy/CiscoSmartGridSecurity_solutions_brief_c22-95556936.pdf".
[30]
Wang W, Lu Z. Cyber security in the Smart Grid: survey and challenges. Computer Networks 2013; Volume 57 Issue 5: pp.1344-1371.
[31]
Kosut O, Jia L, Thomas R, Tong L. On malicious data attacks on power system state estimation, Proceedings of 45th IEEE Universities Power Engineering Conference UPEC, Cardiff, United Kingdom, 2010; pp.1-6.
[32]
Xie L, Mo YL, Sinopoli B. False data injection attacks in electricity markets, Proceedings of 1st IEEE International Conference on Smart Grid Communications, Gaithersburg, MD, USA, October 2010; pp.226-231.
[33]
Jia L, Thomas RJ, Tong Eds.,L. Malicious data attack on real-time electricity market, Proceedings of 2011 IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP, May 2011.
[34]
Akella R, McMillin BM. Information flow analysis of energy management in a Smart Grid. Lecture Notes in Computer Science 2010; Volume 6351: pp.263-276.
[35]
Sandberg H, Teixeira A, Johansson KH. On security indices for state estimators in power networks, Preprints of the First Workshop on Secure Control Systems, CPSWEEK 2010, Stockholm, Sweden, 2010; pp.63-68.
[36]
Kosut O, Jia L, Thomas RJ, Tong L. Limiting false data attacks on power system state estimation, Proceedings of 2010 Conference on Information Sciences and Systems, Princeton, NJ, USA, March 2010; pp.1-6.
[37]
Kim T, Poor H. Strategic protection against data injection attacks on power grids. IEEE Transactions on Smart Grid 2011; Volume 2 Issue 2: pp.326-333.
[38]
Bobba R, Rogers K, Wang Q, Khurana H, Nahrstedt K, Overbye T. Detecting false data injection attacks on dc state estimation, Preprints of the First Workshop on Secure Control Systems, CPSWEEK, Stockholm, Sweden, 2010; pp.18-26.
[39]
Giani A, Bitar E, Garcia M, McQueen M, Khargonekar P, Poolla K. Smart grid data integrity attacks: characterizations and countermeasures, IEEE SmartGridComm, Brussels, Belgium, October 2011; pp.232-237.
[40]
Yi H, Li H, Campbell K, Zhu H. Defending false data injection attack on Smart Grid network using adaptive cusum test, 2011 45th Annual Conference on Information Sciences and Systems CISS, Baltimore, MD, USA, 2011; pp.1-6.
[41]
Pasqualetti F, Carli R, Bullo F. A distributed method for state estimation and false data detection in power networks, IEEE SmartGridComm, Brussels, Belgium, October 2011; pp.469-474.
[42]
Feng J, Potkonjak M. Real-time watermarking techniques for sensor networks, Proceedings of SPIE Security and Watermarking of Multimedia Contents, Santa Clara, California, USA, 2003; pp.391-402.
[43]
Cao J, Fowler J, Younan N. An image-adaptive watermark based on a redundant wavelet transform, Proceedings of 2001 IEEE International Conference on Image Processing, Vol. 2, Thessaloniki, Greece, 2001; pp.277-280.
[44]
Kamel I, Juma H. Simplified watermarking scheme for sensor networks. International Journal of Internet Protocol Technology 2010; Volume 5 Issue 1: pp.101-111.
[45]
Kirovski D, Malvar HS. Spread-spectrum watermarking of audio signals. IEEE Transactions on Signal Processing 2004; Volume 51 Issue 4: pp.1020-1033.

Cited By

View all
  • (2022)Verifiable quaternion fully homomorphic encryption scheme for mitigating false data injection attacks by privacy preservation in fog environmentJournal of Information Security and Applications10.1016/j.jisa.2022.10338371:COnline publication date: 1-Dec-2022
  • (2021)Application of Motion Sensor Based on Neural Network in Basketball Technology and Physical Fitness Evaluation SystemWireless Communications & Mobile Computing10.1155/2021/55629542021Online publication date: 1-Jan-2021
  • (2021)A Diversity Index based Scoring Framework for Identifying Smart Meters Launching Stealthy Data Falsification AttacksProceedings of the 2021 ACM Asia Conference on Computer and Communications Security10.1145/3433210.3437527(26-39)Online publication date: 24-May-2021
  • Show More Cited By

Index Terms

  1. An integrated detection system against false data injection attacks in the Smart Grid
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image Security and Communication Networks
      Security and Communication Networks  Volume 8, Issue 2
      January 2015
      251 pages
      ISSN:1939-0114
      EISSN:1939-0122
      Issue’s Table of Contents

      Publisher

      John Wiley & Sons, Inc.

      United States

      Publication History

      Published: 25 January 2015

      Author Tags

      1. Smart Grid
      2. countermeasures
      3. false data injection attacks

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 12 Sep 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2022)Verifiable quaternion fully homomorphic encryption scheme for mitigating false data injection attacks by privacy preservation in fog environmentJournal of Information Security and Applications10.1016/j.jisa.2022.10338371:COnline publication date: 1-Dec-2022
      • (2021)Application of Motion Sensor Based on Neural Network in Basketball Technology and Physical Fitness Evaluation SystemWireless Communications & Mobile Computing10.1155/2021/55629542021Online publication date: 1-Jan-2021
      • (2021)A Diversity Index based Scoring Framework for Identifying Smart Meters Launching Stealthy Data Falsification AttacksProceedings of the 2021 ACM Asia Conference on Computer and Communications Security10.1145/3433210.3437527(26-39)Online publication date: 24-May-2021
      • (2021)Attack Context Embedded Data Driven Trust Diagnostics in Smart Metering InfrastructureACM Transactions on Privacy and Security10.1145/342673924:2(1-36)Online publication date: 21-Jan-2021
      • (2021)Detection and Forensics against Stealthy Data Falsification in Smart Metering InfrastructureIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2018.288972918:1(356-371)Online publication date: 6-Jan-2021
      • (2021)Towards asynchronous federated learning based threat detectionComputers and Security10.1016/j.cose.2021.102344108:COnline publication date: 1-Sep-2021
      • (2018)A cloud/edge computing streaming system for network traffic monitoring and threat detectionInternational Journal of Security and Networks10.1504/IJSN.2018.1001431713:3(169-186)Online publication date: 1-Jan-2018
      • (2018)Towards Fast and Semi-supervised Identification of Smart Meters Launching Data Falsification AttacksProceedings of the 2018 on Asia Conference on Computer and Communications Security10.1145/3196494.3196551(173-185)Online publication date: 29-May-2018
      • (2017)Diagnosing False Data Injection Attacks in the Smart Grid: a Practical Framework for Home-area NetworksProceedings of the 1st EAI International Conference on Smart Grid Assisted Internet of Things10.4108/eai.7-8-2017.152988(44-53)Online publication date: 7-Aug-2017
      • (2017)An Integrated Simulation Study on Reliable and Effective Distributed Energy Resources in Smart GridProceedings of the International Conference on Research in Adaptive and Convergent Systems10.1145/3129676.3129684(140-145)Online publication date: 20-Sep-2017
      • Show More Cited By

      View Options

      View options

      Get Access

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media