{"title":"On identifying vulnerable nodes for power systems in the presence of undetectable cyber-attacks","authors":"Ting Zhao, Yun Xu, Yi-nan Wang, Zhiyun Lin, Wenyuan Xu, Qiang Yang","doi":"10.1109/ICIEA.2016.7603739","DOIUrl":null,"url":null,"abstract":"The growing dependence of critical infrastructures and industrial automation on smart grids has resulted in growing and unforeseen cyber security threatens to power systems. Identifying vulnerable nodes and analyzing the influence of undetectable attacks play an important role in defending cyber attacks. This paper aims to identify the nodes, at which attacks may occur but are not detectable based on the measurements for the power systems, and then further identify the vulnerable nodes by analyzing whether these undetectable attacks lead to damages to the power networks. Several algorithms are developed for these goals by considering the cases with a single attack, multiple simultaneous attacks, and persistent attacks. Finally, the algorithms are validated with the IEEE 3-machine 6-bus system.","PeriodicalId":283114,"journal":{"name":"2016 IEEE 11th Conference on Industrial Electronics and Applications (ICIEA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE 11th Conference on Industrial Electronics and Applications (ICIEA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIEA.2016.7603739","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
The growing dependence of critical infrastructures and industrial automation on smart grids has resulted in growing and unforeseen cyber security threatens to power systems. Identifying vulnerable nodes and analyzing the influence of undetectable attacks play an important role in defending cyber attacks. This paper aims to identify the nodes, at which attacks may occur but are not detectable based on the measurements for the power systems, and then further identify the vulnerable nodes by analyzing whether these undetectable attacks lead to damages to the power networks. Several algorithms are developed for these goals by considering the cases with a single attack, multiple simultaneous attacks, and persistent attacks. Finally, the algorithms are validated with the IEEE 3-machine 6-bus system.