{"title":"On phasor measurement unit placement against state and topology attacks","authors":"Jinsub Kim, L. Tong","doi":"10.1109/SmartGridComm.2013.6687990","DOIUrl":null,"url":null,"abstract":"Cyber attacks on the SCADA system can mislead the control center to produce incorrect state and topology estimate. If undetected, state and topology attacks can have detrimental impacts on the real-time operation of a power system. The problem of placing secure phasor measurement units (PMUs) to detect such attacks is considered. It is shown that any state or topology attack is detectable if and only if buses with secure PMUs form a vertex cover of the system topology. This condition leads to the countermeasures constructed by available graph algorithms. The examples with IEEE 14-bus, 118-bus, and 300-bus systems demonstrate applications of the countermeasures.","PeriodicalId":136434,"journal":{"name":"2013 IEEE International Conference on Smart Grid Communications (SmartGridComm)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"43","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE International Conference on Smart Grid Communications (SmartGridComm)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SmartGridComm.2013.6687990","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 43
Abstract
Cyber attacks on the SCADA system can mislead the control center to produce incorrect state and topology estimate. If undetected, state and topology attacks can have detrimental impacts on the real-time operation of a power system. The problem of placing secure phasor measurement units (PMUs) to detect such attacks is considered. It is shown that any state or topology attack is detectable if and only if buses with secure PMUs form a vertex cover of the system topology. This condition leads to the countermeasures constructed by available graph algorithms. The examples with IEEE 14-bus, 118-bus, and 300-bus systems demonstrate applications of the countermeasures.