This is an open access article published by the IET under the Creative Commons Attribution License (http://creativecommons.org/licenses/by/3.0/)
The smart grid is arguably one of the most complex cyber-physical systems (CPS). Complex security challenges have been revealed in both the physical and the cyber parts of the smart grid, and an integrative analysis on the cyber-physical (CP) security is emerging. This paper provides a comprehensive and systematic review of the critical attack threats and defence strategies in the smart grid. We start this survey with an overview of the smart grid security from the CP perspective, and then focuses on prominent CP attack schemes with significant impact on the smart grid operation and corresponding defense solutions. With an in-depth review of the attacks and defences, we then discuss the opportunities and challenges along the smart grid CP security. We hope this paper raises awareness of the CP attack threats and defence strategies in complex CPS-based infrastructures such as the smart grid and inspires research effort toward the development of secure and resilient CP infrastructures.
References
-
-
1)
-
112. Grochocki, D., Huh, J.H., Berthier, R., et al: ‘AMI threats, intrusion detection requirements and deployment recommendations’. 2012 IEEE Third Int. Conf. on Proc. Smart Grid Communications (SmartGridComm), 2012, pp. 395–400.
-
2)
-
31. Holmgren, A.J., Jenelius, E., Westin, J.: ‘Evaluating strategies for defending electric power networks against antagonistic attacks’, IEEE Trans. Power Syst., 2007, 22, (1), pp. 76–84 (doi: 10.1109/TPWRS.2006.889080).
-
3)
-
88. Rahman, M.A., Al-Shaer, E., Kavasseri, R.G.: ‘A formal model for verifying the impact of stealthy attacks on optimal power flow in power grids’. Proc. ICCPS'14: ACM/IEEE Fifth Int. Conf. on Cyber-Physical Systems (with CPSWeek 2014), 2014, pp. 175–186.
-
4)
-
4. National Institute of Standards and Technologies (NIST): ‘Framework and roadmap for smart grid interoperability standards – release v3.0’ (NIST Special Publication, Gaithersburg, MD, 2014).
-
5)
-
122. Yi, P., Zhu, T., Zhang, Q., et al: ‘Puppet attack: a denial of service attack in advanced metering infrastructure network’, J. Netw. Comput. Appl., 2016, 59, pp. 325–332 (doi: 10.1016/j.jnca.2015.04.015).
-
6)
-
143. Sun, C.-C., Liu, C.-C., Xie, J.: ‘Cyber–physical system security of a power grid: state-of-the-art’, Electronics, 2016, 5, (3), p. 40 (doi: 10.3390/electronics5030040).
-
7)
-
70. Farraj, A.K., Hammad, E.M., Kundur, D., et al: ‘Practical limitations of sliding-mode switching attacks on smart grid systems’. Proc. 2014 IEEE PES General Meeting – Conf. Exposition, 2014, pp. 1–5.
-
8)
-
1. Morison, K., Wang, L., Kundur, P.: ‘Power system security assessment’, IEEE Power Energy Mag., 2004, 2, (5), pp. 30–39 (doi: 10.1109/MPAE.2004.1338120).
-
9)
-
152. Talebi, M., Wang, J., Qu, Z.: ‘Secure power systems against malicious cyber–physical data attacks: protection and identification’. Proc. Int. Conf. on Power Systems Engineering, 2012, pp. 11–12.
-
10)
-
61. Hong, J.: ‘Cybersecurity of substation automation systems’. PhD thesis, Washington State University, 2014.
-
11)
-
157. Ismail, Z., Leneutre, J., Bateman, D., et al: ‘A game theoretical analysis of data confidentiality attacks on smart-grid AMI’, IEEE J. Sel. Areas Commun., 2014, 32, (7), pp. 1486–1499 (doi: 10.1109/JSAC.2014.2332095).
-
12)
-
160. Vamvoudakis, K.G., Hespanha, J.P., Sinopoli, B., et al: ‘Detection in adversarial environments’, IEEE Trans. Autom. Control, 2014, 59, (12), pp. 3209–3223 (doi: 10.1109/TAC.2014.2351671).
-
13)
-
130. Tan, R., Krishna, V.B., Yau, D.K.Y., et al: ‘Integrity attacks on real-time pricing in electric power grids’, ACM Trans. Inf. Syst. Sec. (TISSEC), 2015, 18, (2), pp. 5:1–5:33.
-
14)
-
71. Abur, A., Exposito, A.G.: ‘Power system state estimation: theory and implementation’ (CRC Press, Boca Raton, FL, 2004, 1st edn.).
-
15)
-
91. Chakhchoukh, Y., Ishii, H.: ‘Coordinated cyber-attacks on the measurement function in hybrid state estimation’, IEEE Trans. Power Syst., 2015, 30, (5), pp. 2487–2497 (doi: 10.1109/TPWRS.2014.2357182).
-
16)
-
175. Xiao, Z., Xiao, Y., Du, D.H.C.: ‘Exploring malicious meter inspection in neighborhood area smart grids’, IEEE Trans. Smart Grid, 2013, 4, (1), pp. 214–226 (doi: 10.1109/TSG.2012.2229397).
-
17)
-
8. Salmeron, J., Wood, K., Baldick, R.: ‘Worst-case interdiction analysis of large-scale electric power grids’, IEEE Trans. Power Syst., 2009, 24, (1), pp. 96–104 (doi: 10.1109/TPWRS.2008.2004825).
-
18)
-
119. Sankar, L., Rajagopalan, S.R., Mohajer, S., et al: ‘Smart meter privacy: a theoretical framework’, IEEE Trans. Smart Grid, 2013, 4, (2), pp. 837–846 (doi: 10.1109/TSG.2012.2211046).
-
19)
-
179. Jindal, A., Dua, A., Kaur, K., et al: ‘Decision tree and SVM based data analytics for theft detection in smart grid’, IEEE Trans. Ind. Inf., 2016, 12, (3), pp. 1005–1016 (doi: 10.1109/TII.2016.2543145).
-
20)
-
186. Ozay, M., Esnaola, I., Vural, F.T.Y., et al: ‘Machine learning methods for attack detection in the smart grid’, IEEE Trans. Neural Netw. Learn. Syst., 2016, 27, (8), pp. 1773–1786 (doi: 10.1109/TNNLS.2015.2404803).
-
21)
-
171. Mitchell, R., Chen, I.R.: ‘Behavior-rule based intrusion detection systems for safety critical smart grid applications’, IEEE Trans. Smart Grid, 2013, 4, (3), pp. 1254–1263 (doi: 10.1109/TSG.2013.2258948).
-
22)
-
57. Yan, J., Zhu, Y., He, H., et al: ‘Multi-contingency cascading analysis of smart grid based on self-organizing map’, IEEE Trans. Inf. Forensics Sec., 2013, 8, (4), pp. 646–656 (doi: 10.1109/TIFS.2013.2249065).
-
23)
-
151. Bi, S., Zhang, Y.J.: ‘Using covert topological information for defense against malicious attacks on DC state estimation’, IEEE J. Sel. Areas Commun., 2014, 32, (7), pp. 1471–1485 (doi: 10.1109/JSAC.2014.2332051).
-
24)
-
40. Hines, P., Dobson, I., Rezaei, P.: ‘Cascading power outages propagate locally in an influence graph that is not the actual grid topology’, IEEE Trans. Power Syst., 2016, PP, (99), pp. 1–1 (doi: 10.1109/TPWRS.2016.2578259).
-
25)
-
150. Bi, S., Zhang, Y.J.: ‘Graphical methods for defense against false-data injection attacks on power system state estimation’, IEEE Trans. Smart Grid, 2014, 5, (3), pp. 1216–1227 (doi: 10.1109/TSG.2013.2294966).
-
26)
-
198. Esmalifalak, M., Shi, G., Han, Z., et al: ‘Bad data injection attack and defense in electricity market using game theory study’, IEEE Trans. Smart Grid, 2013, 4, (1), pp. 160–169 (doi: 10.1109/TSG.2012.2224391).
-
27)
-
126. Duan, J., Zeng, W., Chow, M.Y.: ‘Economic impact of data integrity attacks on distributed DC optimal power flow algorithm’. Proc. North American Power Symp. (NAPS), 2015, 2015, pp. 1–7.
-
28)
-
35. Yan, J., Tang, Y., Zhu, Y., et al: ‘Smart grid vulnerability under cascade-based sequential line-switching attacks’. Proc. 2015 IEEE Global Communications Conf. (GLOBECOM), 2015, pp. 1–7.
-
29)
-
3. Wood, A.J., Wollenberg, B.F.: ‘Power generation, operation, and control’ (John Wiley & Sons, Hoboken, NJ, 2012, 3rd edn.).
-
30)
-
43. Holme, P., Kim, B.J., Yoon, C.N., et al: ‘Attack vulnerability of complex networks’, Phys. Rev. E, 2002, 65, (5), p. 056109 (doi: 10.1103/PhysRevE.65.056109).
-
31)
-
137. Wang, W., Lu, Z.: ‘Cybersecurity in the smart grid: survey and challenges’, Comput. Netw., 2013, 57, (5), pp. 1344–1371 (doi: 10.1016/j.comnet.2012.12.017).
-
32)
-
15. Li, Z., Shahidehpour, M., Alabdulwahab, A., et al: ‘Bilevel model for analyzing coordinated cyber-physical attacks on power systems’, IEEE Trans. Smart Grid, 2015, 7, (5), pp. 2260–2272 (doi: 10.1109/TSG.2015.2456107).
-
33)
-
95. Deka, D., Baldick, R., Vishwanath, S.: ‘Optimal data attacks on power grids: leveraging detection & measurement jamming’. Proc. 2015 IEEE Int. Conf. on Smart Grid Communications (SmartGridComm), 2015, pp. 392–397.
-
34)
-
93. Zhang, J., Sankar, L.: ‘Physical system consequences of unobservable state-and-topology cyber–physical attacks’, IEEE Trans. Smart Grid, 2016, 7, (4), pp. 2016–2025 (doi: 10.1109/TSG.2016.2552178).
-
35)
-
182. Huang, Y., Tang, J., Cheng, Y., et al: ‘Real-time detection of false data injection in smart grid networks: an adaptive CUSUM method and analysis’, IEEE Syst. J., 2016, 10, (2), pp. 532–543 (doi: 10.1109/JSYST.2014.2323266).
-
36)
-
114. McLaughlin, S., Podkuiko, D., McDaniel, P.: ‘Energy theft in the advanced metering infrastructure’. Proc. Int. Workshop on Critical Information Infrastructures Security, 2009, pp. 176–187.
-
37)
-
67. Liu, S., Mashayekh, S., Kundur, D., et al: ‘A framework for modeling cyber–physical switching attacks in smart grid’, IEEE Trans. Emerging Top. Comput., 2013, 1, (2), pp. 273–285 (doi: 10.1109/TETC.2013.2296440).
-
38)
-
25. Li, F., Qiao, W., Sun, H., et al: ‘Smart transmission grid: vision and framework’, IEEE Trans. Smart Grid, 2010, 1, (2), pp. 168–177 (doi: 10.1109/TSG.2010.2053726).
-
39)
-
118. McKenna, E., Richardson, I., Thomson, M.: ‘Smart meter data: balancing consumer privacy concerns with legitimate applications’, Energy Policy, 2012, 41, pp. 807–814 (doi: 10.1016/j.enpol.2011.11.049).
-
40)
-
62. Moreira, N., Molina, E., Lázaro, J., et al: ‘Cyber-security in substation automation systems’, Renew. Sustain. Energy Rev., 2016, 54, pp. 1552–1562 (doi: 10.1016/j.rser.2015.10.124).
-
41)
-
115. McLaughlin, S., Holbert, B., Fawaz, A., et al: ‘A multi-sensor energy theft detection framework for advanced metering infrastructures’, IEEE J. Sel. Areas Commun., 2013, 31, (7), pp. 1319–1330 (doi: 10.1109/JSAC.2013.130714).
-
42)
-
106. Liu, X., Li, Z.: ‘Trilevel modeling of cyber attacks on transmission lines’, IEEE Trans. Smart Grid, 2015, .
-
43)
-
89. Rahman, M.A., Al-Shaer, E., Kavasseri, R.: ‘Impact analysis of topology poisoning attacks on economic operation of the smart power grid’. 2014 IEEE 34th Int. Conf. on Proc. Distributed Computing Systems (ICDCS), 2014, pp. 649–659.
-
44)
-
153. Etemad, R.H., Lahouti, F.: ‘Resilient decentralized consensus-based state estimation for smart grid in presence of false data’. Proc. 2016 IEEE Int. Conf. on Acoustics, Speech and Signal Processing (ICASSP), 2016, pp. 3466–3470.
-
45)
-
77. Kim, T.T., Poor, H.V.: ‘Strategic protection against data injection attacks on power grids’, IEEE Trans. Smart Grid, 2011, 2, (2), pp. 326–333 (doi: 10.1109/TSG.2011.2119336).
-
46)
-
6. Salmeron, J., Wood, K., Baldick, R.: ‘Analysis of electric grid security under terrorist threat’, IEEE Trans. Power Syst., 2004, 19, (2), pp. 905–912 (doi: 10.1109/TPWRS.2004.825888).
-
47)
-
136. Ma, R., Chen, H.-H., Huang, Y.-R., et al: ‘Smart grid communication: its challenges and opportunities’, IEEE Trans. Smart Grid, 2013, 4, (1), pp. 36–46 (doi: 10.1109/TSG.2012.2225851).
-
48)
-
38. Bompard, E., Pons, E., Wu, D.: ‘Extended topological metrics for the analysis of power grid vulnerability’, IEEE Syst. J., 2012, 6, (3), pp. 481–487 (doi: 10.1109/JSYST.2012.2190688).
-
49)
-
154. Liu, N., Chen, J., Zhu, L., et al: ‘A key management scheme for secure communications of advanced metering infrastructure in smart grid’, IEEE Trans. Ind. Electron., 2013, 60, (10), pp. 4746–4756 (doi: 10.1109/TIE.2012.2216237).
-
50)
-
17. Mo, Y., Sinopoli, B.: ‘On the performance degradation of cyber–physical systems under stealthy integrity attacks’, IEEE Trans. Autom. Control, 2016, 61, (9), pp. 2618–2624 (doi: 10.1109/TAC.2015.2498708).
-
51)
-
156. Tsai, J.L., Lo, N.W.: ‘Secure anonymous key distribution scheme for smart grid’, IEEE Trans. Smart Grid, 2016, 7, (2), pp. 906–914.
-
52)
-
169. Morris, T., Pan, S., Adhikari, U., et al: ‘Cybersecurity testing and intrusion detection for synchrophasor systems’, Int. J. Netw. Sci., 2016, 1, (1), pp. 28–52 (doi: 10.1504/IJNS.2016.073552).
-
53)
-
167. Pal, S., Sikdar, B.: ‘A Mechanism for detecting data manipulation attacks on PMU data’. 2014 IEEE Int. Conf. on Proc. Communication Systems (ICCS), 2014, pp. 253–257.
-
54)
-
30. Bier, V.M., Gratz, E.R., Haphuriwat, N.J., et al: ‘Methodology for identifying near-optimal interdiction strategies for a power transmission system’, Reliab. Eng. Syst. Saf., 2007, 92, (9), pp. 1155–1161 (doi: 10.1016/j.ress.2006.08.007).
-
55)
-
104. Liu, X., Li, Z., Liu, X., et al: ‘Masking transmission line outages via false data injection attacks’, IEEE Trans. Inf. Forensics Sec., 2016, 11, (7), pp. 1592–1602 (doi: 10.1109/TIFS.2016.2542061).
-
56)
-
6. Kosut, O., Jia, L., Thomas, R.J., et al: ‘Malicious data attacks on the smart grid’, IEEE Trans. Smart Grid, 2011, 2, (4), pp. 645–658 (doi: 10.1109/TSG.2011.2163807).
-
57)
-
166. Yang, Y., McLaughlin, K., Sezer, S., et al: ‘Intrusion detection system for network security in synchrophasor systems’. IET Int. Conf. on Proc. Information and Communications Technologies (IETICT 2013), 2013, pp. 246–252.
-
58)
-
36. Yan, J., He, H., Zhong, X., et al: ‘Q-learning based vulnerability analysis of smart grid against sequential topology attacks’, IEEE Trans. Inf. Forensics Sec., 2017, 12, (1), pp. 200–210 (doi: 10.1109/TIFS.2016.2607701).
-
59)
-
37. Ozay, M., Esnaola, I., Vural, F.T., et al: ‘Sparse attack construction and state estimation in the smart grid: centralized and distributed models’, IEEE J. Sel. Areas Commun., 2013, 31, (7), pp. 1306–1318 (doi: 10.1109/JSAC.2013.130713).
-
60)
-
69. Farraj, A.K., Kundur, D.: ‘On using energy storage systems in switching attacks that destabilize smart grid systems’. 2015 IEEE Power & Energy Society Proc. Innovative Smart Grid Technologies Conf. (ISGT), IEEE, 2015, pp. 1–5.
-
61)
-
59. Sridhar, S., Manimaran, G.: ‘Data integrity attack and its impacts on voltage control loop in power grid’. Proc. 2011 IEEE Power and Energy Society General Meeting, 2011, pp. 1–6.
-
62)
-
15. Buldyrev, S.V., Parshani, R., Paul, G., et al: ‘Catastrophic cascade of failures in interdependent networks’, Nature, 2010, 464, pp. 1025–1028 (doi: 10.1038/nature08932).
-
63)
-
72. Liu, Y., Ning, P., Reiter, M.K.: ‘False data injection attacks against state estimation in electric power grids’, ACM Trans. Inf. Syst. Sec. (TISSEC), 2011, 14, (1), p. 13.
-
64)
-
140. Mallouhi, M., Al-Nashif, Y., Cox, D., et al: ‘A testbed for analyzing security of SCA control systems (TASSCS)’. 2011 IEEE PES Proc. Innovative Smart Grid Technologies (ISGT), 2011, pp. 1–7.
-
65)
-
86. Yu, Z.H., Chin, W.L.: ‘Blind false data injection attack using PCA approximation method in smart grid’, IEEE Trans. Smart Grid, 2015, 6, (3), pp. 1219–1226 (doi: 10.1109/TSG.2014.2382714).
-
66)
-
73. Kim, J., Tong, L.: ‘On topology attack of a smart grid: undetectable attacks and countermeasures’, IEEE J. Sel. Areas Commun., 2013, 31, (7), pp. 1294–1305 (doi: 10.1109/JSAC.2013.130712).
-
67)
-
83. Anwar, A., Mahmood, A.N., Pickering, M.: ‘Data-driven stealthy injection attacks on smart grid with incomplete measurements’. Proc. Pacific-Asia Workshop on Intelligence and Security Informatics, 2016, pp. 180–192.
-
68)
-
141. Hahn, A., Ashok, A., Sridhar, S., et al: ‘Cyber–physical security testbeds: architecture, application, and evaluation for smart grid’, IEEE Trans. Smart Grid, 2013, 4, (2), pp. 847–855 (doi: 10.1109/TSG.2012.2226919).
-
69)
-
25. Esfahani, P.M., Vrakopoulou, M., Margellos, K., et al: ‘Cyber attack in a two-area power system: impact identification using reachability’. Proc. of the 2010 American Control Conf., 2010, pp. 962–967.
-
70)
-
82. Rahman, M.A., Mohsenian-Rad, H.: ‘False data injection attacks with incomplete information against smart power grids’. Proc. Global Communications Conf. (GLOBECOM), 2012 IEEE, 2012, pp. 3153–3158.
-
71)
-
9. Govindarasu, M., Hann, A., Sauer, P.: ‘White paper: cyber–physical systems security for smart grid’. 2012.
-
72)
-
29. Liu, J., Xiao, Y., Gao, J.: ‘Achieving accountability in smart grid’, IEEE Syst. J., 2014, 8, (2), pp. 493–508. (doi: 10.1109/JSYST.2013.2260697).
-
73)
-
47. Bompard, E., Napoli, R., Xue, F.: ‘Analysis of structural vulnerabilities in power transmission grids’, Int. J. Crit. Infrastruct. Prot., 2009, 2, (1), pp. 5–12 (doi: 10.1016/j.ijcip.2009.02.002).
-
74)
-
132. Mohsenian-Rad, A.-H., Leon-Garcia, A.: ‘Distributed internet-based load altering attacks against smart power grids’, IEEE Trans. Smart Grid, 2011, 2, (4), pp. 667–674 (doi: 10.1109/TSG.2011.2160297).
-
75)
-
103. Xiang, Y., Ding, Z., Zhang, Y., et al: ‘Power system reliability evaluation considering load redistribution attacks’, IEEE Trans. Smart Grid, 2016, PP, (99), pp. 1–10 (doi: 10.1109/TSG.2016.2569589).
-
76)
-
85. Esmalifalak, M., Nguyen, H., Zheng, R., et al: ‘Stealth false data injection using independent component analysis in smart grid’. 2011 IEEE Int. Conf. on Proc. Smart Grid Communications (Smart-GridComm), IEEE, 2011, pp. 244–248.
-
77)
-
54. Tweed, K.: ‘Attack on nine substations could take down US grid’ (IEEE Spectrum, 2014). .
-
78)
-
178. Mashima, D., Cárdenas, A.A.: ‘Evaluating electricity theft detectors in smart grid networks’. Proc. Int. Workshop on Recent Advances in Intrusion Detection, 2012, pp. 210–229.
-
79)
-
149. Sanjab, A., Saad, W.: ‘Data injection attacks on smart grids with multiple adversaries: a game-theoretic perspective’, IEEE Trans. Smart Grid, 2016, 7, (4), pp. 2038–2049 (doi: 10.1109/TSG.2016.2550218).
-
80)
-
7. Yan, Y., Qian, Y., Sharif, H., et al: ‘A survey on smart grid communication infrastructures: motivations, requirements and challenges’, IEEE Commun. Surv. Tutor., 2013, 15, (1), pp. 5–20 (doi: 10.1109/SURV.2012.021312.00034).
-
81)
-
164. Premaratne, U.K., Samarabandu, J., Sidhu, T.S., et al: ‘An intrusion detection system for IEC61850 automated substations’, IEEE Trans. Power Deliv., 2010, 25, (4), pp. 2376–2383 (doi: 10.1109/TPWRD.2010.2050076).
-
82)
-
30. Xia, J., Wang, Y.: ‘Secure key distribution for the smart grid’, IEEE Trans. Smart Grid, 2012, 3, (3), pp. 1437–1443 (doi: 10.1109/TSG.2012.2199141).
-
83)
-
42. Motter, A.E., Lai, Y.-C.: ‘Cascade-based attacks on complex networks’, Phys. Rev. E, 2002, 66, (6), p. 065102 (doi: 10.1103/PhysRevE.66.065102).
-
84)
-
99. Yuan, Y., Li, Z., Ren, K.: ‘Quantitative analysis of load redistribution attacks in power systems’, IEEE Trans. Parallel Distrib. Syst., 2012, 23, (9), pp. 1731–1738 (doi: 10.1109/TPDS.2012.58).
-
85)
-
3. Moslehi, K., Kumar, R.: ‘A reliability perspective of the smart grid’, IEEE Trans. Smart Grid, 2010, 1, (1), pp. 57–64 (doi: 10.1109/TSG.2010.2046346).
-
86)
-
68. Liu, S., Chen, B., Zourntos, T., et al: ‘A coordinated multiswitch attack for cascading failures in smart grid’, IEEE Trans. Smart Grid, 2014, 5, (3), pp. 1183–1195 (doi: 10.1109/TSG.2014.2302476).
-
87)
-
121. Yi, P., Zhu, T., Zhang, Q., et al: ‘A denial of service attack in advanced metering infrastructure network’. Proc. 2014 IEEE Int. Conf. on Communications (ICC), 2014, pp. 1029–1034.
-
88)
-
10. Mo, Y., Kim, T.H.J., Brancik, K., et al: ‘Cyber–physical security of a smart grid infrastructure’, Proc. IEEE, 2012, 100, (1), pp. 195–209 (doi: 10.1109/JPROC.2011.2161428).
-
89)
-
192. Yao, Y., Edmunds, T., Papageorgiou, D., et al: ‘Trilevel optimization in power network defense’, IEEE Trans. Syst. Man Cybern. C, Appl. Rev., 2007, 37, (4), pp. 712–718 (doi: 10.1109/TSMCC.2007.897487).
-
90)
-
26. Esfahani, P.M., Vrakopoulou, M., Margellos, K., et al: ‘A robust policy for automatic generation control cyber attack in two area power network’. Proc. 49th IEEE Conf. on Decision and Control (CDC), 2010, pp. 5973–5978.
-
91)
-
190. Ma, C.Y.T., Yau, D.K.Y., Lou, X., et al: ‘Markov game analysis for attack-defense of power networks under possible misinformation’, IEEE Trans. Power Syst., 2013, 28, (2), pp. 1676–1686 (doi: 10.1109/TPWRS.2012.2226480).
-
92)
-
159. Mo, Y., Chabukswar, R., Sinopoli, B.: ‘Detecting integrity attacks on SCADA systems’, IEEE Trans. Control Syst. Technol., 2014, 22, (4), pp. 1396–1407 (doi: 10.1109/TCST.2013.2280899).
-
93)
-
28. Motto, A.L., Arroyo, J.M., Galiana, F.D.: ‘A mixed-integer LP procedure for the analysis of electric grid security under disruptive threat’, IEEE Trans. Power Syst., 2005, 20, (3), pp. 1357–1365 (doi: 10.1109/TPWRS.2005.851942).
-
94)
-
174. Fadlullah, Z.M., Fouda, M.M., Kato, N., et al: ‘An early warning system against malicious activities for smart grid communications’, IEEE Netw., 2011, 25, (5), pp. 50–55 (doi: 10.1109/MNET.2011.6033036).
-
95)
-
40. Zhu, Y.H., Yan, J., Tang, Y.F., et al: ‘Joint substation-transmission line vulnerability assessment against the smart grid’, IEEE Trans. Inf. Forensics Sec., 2015, 10, (5), pp. 1010–1024 (doi: 10.1109/TIFS.2015.2394240).
-
96)
-
33. Zhang, Y., Xiang, Y., Wang, L.: ‘Power system reliability assessment incorporating cyber attacks against wind farm energy management systems’, IEEE Trans. Smart Grid, 2016, PP, (99), pp. 1–15.
-
97)
-
65. Liu, S., Mashayekh, S., Kundur, D., et al: ‘A smart grid vulnerability analysis framework for coordinated variable structure switching attacks’. Proc. 2012 IEEE Power and Energy Society General Meeting, 2012, pp. 1–6.
-
98)
-
8. Bertsch, J., Carnal, C., Karlson, D., et al: ‘Wide-area protection and power system utilization’, Proc. IEEE, 2005, 93, (5), pp. 997–1003 (doi: 10.1109/JPROC.2005.847266).
-
99)
-
194. Delgadillo, A., Arroyo, J.M., Alguacil, N.: ‘Analysis of electric grid interdiction with line switching’, IEEE Trans. Power Syst., 2010, 25, (2), pp. 633–641 (doi: 10.1109/TPWRS.2009.2032232).
-
100)
-
2. Farhangi, H.: ‘The path of the smart grid’, IEEE Power Energy Mag., 2010, 8, (1), pp. 18–28 (doi: 10.1109/MPE.2009.934876).
-
101)
-
133. Wei, D., Lu, Y., Jafari, M., et al: ‘Protecting smart grid automation systems against cyber attacks’, IEEE Trans. Smart Grid, 2011, 2, (4), pp. 782–795 (doi: 10.1109/TSG.2011.2159999).
-
102)
-
138. Qiu, R.C., Hu, Z., Chen, Z., et al: ‘Cognitive radio network for the smart grid: experimental system architecture, control algorithms, security, and microgrid testbed’, IEEE Trans. Smart Grid, 2011, 2, (4), pp. 724–740 (doi: 10.1109/TSG.2011.2160101).
-
103)
-
24. Srikantha, P., Kundur, D.: ‘Denial of service attacks and mitigation for stability in cyber-enabled power grid’. Proc. Innovative Smart Grid Technologies Conf. (ISGT), 2015 IEEE Power Energy Society, 2015, pp. 1–5.
-
104)
-
134. Metke, A.R., Ekl, R.L.: ‘Security technology for smart grid networks’, IEEE Trans. Smart Grid, 2010, 1, (1), pp. 99–107 (doi: 10.1109/TSG.2010.2046347).
-
105)
-
110. Li, H., Gong, S., Lai, L., et al: ‘Efficient and secure wireless communications for advanced metering infrastructure in smart grids’, IEEE Trans. Smart Grid, 2012, 3, (3), pp. 1540–1551 (doi: 10.1109/TSG.2012.2203156).
-
106)
-
97. Deka, D., Baldick, R., Vishwanath, S.: ‘One breaker is enough: hidden topology attacks on power grids’. Proc. 2015 IEEE Power Energy Society General Meeting, 2015, pp. 1–5.
-
107)
-
109. Jiang, X., Zhang, J., Harding, B.J., et al: ‘Spoofing GPS receiver clock offset of phasor measurement units’, IEEE Trans. Power Syst., 2013, 28, (3), pp. 3253–3262 (doi: 10.1109/TPWRS.2013.2240706).
-
108)
-
135. Yan, Y., Qian, Y., Sharif, H., et al: ‘A survey on cybersecurity for smart grid communications’, IEEE Commun. Surv. Tutor., 2012, 14, (4), pp. 998–1010 (doi: 10.1109/SURV.2012.010912.00035).
-
109)
-
11. Manandhar, K., Cao, X., Hu, F., et al : ‘Detection of faults and attacks including false data injection attack in smart grid using Kalman filter’, IEEE Trans. Control Netw. Syst., 2014, 1, (4), pp. 370–379 (doi: 10.1109/TCNS.2014.2357531).
-
110)
-
16. Ten, C., Liu, C., Manimaran, G.: ‘Vulnerability assessment of cybersecurity for SCADA systems’, IEEE Trans. Power Syst., 2008, 23, (4), pp. 1836–1846 (doi: 10.1109/TPWRS.2008.2002298).
-
111)
-
128. Rangarajan, R.: ‘Quantifying the economic impacts of attacks on competitive energy markets’. Proc. North American Power Symp. (NAPS), 2014, 2014, pp. 1–6.
-
112)
-
38. Cuadra, L., Salcedo-Sanz, S., Del Ser, J., et al: ‘A critical review of robustness in power grids using complex networks concepts’, Energies, 2015, 8, (9), pp. 9211–9265 (doi: 10.3390/en8099211).
-
113)
-
189. Chen, P.Y., Cheng, S.M., Chen, K.C.: ‘Smart attacks in smart grid communication networks’, IEEE Commun. Mag., 2012, 50, (8), pp. 24–29 (doi: 10.1109/MCOM.2012.6257523).
-
114)
-
87. Esnaola, I., Perlaza, S.M., Poor, H.V., et al: ‘Maximum distortion attacks in electricity grids’, IEEE Trans. Smart Grid, 2016, 7, (4), pp. 2007–2015 (doi: 10.1109/TSG.2016.2550420).
-
115)
-
108. Zhang, Z., Gong, S., Dimitrovski, A.D., et al: ‘Time synchronization attack in smart grid: impact and analysis’, IEEE Trans. Smart Grid, 2013, 4, (1), pp. 87–98 (doi: 10.1109/TSG.2012.2227342).
-
116)
-
120. McLaughlin, S., Podkuiko, D., Miadzvezhanka, S., et al: ‘Multi-vendor penetration testing in the advanced metering infrastructure’. ACSAC ’10 Proc. of the 26th Annual Computer Security Applications Conf., Austin, TX, USA, 2010, pp. 107–116. .
-
117)
-
144. Adhikari, U., Morris, T., Pan, S.: ‘WAMS cyber–physical test bed for power system, cybersecurity study, and data mining’, IEEE Trans. Smart Grid, 2016, PP, (99), pp. 1–1 (doi: 10.1109/TSG.2016.2537210).
-
118)
-
12. Dwivedi, A., Yu, X.: ‘A maximum-flow-based complex network approach for power system vulnerability analysis’, IEEE Trans. Ind. Inf., 2013, 9, (1), pp. 81–88 (doi: 10.1109/TII.2011.2173944).
-
119)
-
184. Ashok, A., Govindarasu, M., Ajjarapu, V.: ‘Online detection of stealthy false data injection attacks in power system state estimation’, IEEE Trans. Smart Grid, 2016, PP, (99), pp. 1–1 (doi: 10.1109/TSG.2016.2596298).
-
120)
-
176. Xiao, Z., Xiao, Y., Du, D.H.C.: ‘Non-repudiation in neighborhood area networks for smart grid’, IEEE Commun. Mag., 2013, 51, (1), pp. 18–26 (doi: 10.1109/MCOM.2013.6400434).
-
121)
-
39. Zhu, Y.H., Yan, J., Sun, Y., et al: ‘Revealing cascading failure vulnerability in power grids using risk-graph’, IEEE Trans. Parallel Distrib. Syst., 2014, 25, (12), pp. 3274–3284 (doi: 10.1109/TPDS.2013.2295814).
-
122)
-
196. Chen, Y., Hong, J., Liu, C.C.: ‘Modeling of intrusion and defense for assessment of cybersecurity at power substations’, IEEE Trans. Smart Grid, 2016, PP, (99), pp. 1–1.
-
123)
-
185. Esmalifalak, M., Liu, L., Nguyen, N., et al: ‘Detecting stealthy false data injection using machine learning in smart grid’, IEEE Syst. J., 2014, PP, (99), pp. 1–1 (doi: 10.1109/JSYST.2014.2341597).
-
124)
-
131. Giraldo, J., Crdenas, A., Quijano, N.: ‘Integrity attacks on real-time pricing in smart grids: impact and countermeasures’, IEEE Trans. Smart Grid, 2016, PP, (99), pp. 1–1 (doi: 10.1109/TSG.2016.2521339).
-
125)
-
13. U.S.-Canada Power System Outage Task Force: ‘Final report on the August 14, 2003 blackout in the United States and Canada: causes and recommendations’. 2004.
-
126)
-
123. Jia, L., Kim, J., Thomas, R.J., et al: ‘Impact of data quality on real-time locational marginal price’, IEEE Trans. Power Syst., 2014, 29, (2), pp. 627–636 (doi: 10.1109/TPWRS.2013.2286992).
-
127)
-
7. Manousakis, N.M., Korres, G.N., Georgilakis, P.S.: ‘Taxonomy of PMU placement methodologies’, IEEE Trans. Power Syst., 2012, 27, (2), pp. 1070–1077 (doi: 10.1109/TPWRS.2011.2179816).
-
128)
-
172. Faisal, M.A., Aung, Z., Williams, J.R., et al: ‘Data-stream-based intrusion detection system for advanced metering infrastructure in smart grid: a feasibility study’, IEEE Syst. J., 2015, 9, (1), pp. 31–44 (doi: 10.1109/JSYST.2013.2294120).
-
129)
-
197. Vukovic, O., Sou, K.C., Dan, G., et al: ‘Network-aware mitigation of data integrity attacks on power system state estimation’, IEEE J. Sel. Areas Commun., 2012, 30, (6), pp. 1108–1118 (doi: 10.1109/JSAC.2012.120709).
-
130)
-
113. Anwar, A., Mahmood, A.N., Tari, Z.: ‘Identification of vulnerable node clusters against false data injection attack in an AMI based smart grid’, Inf. Syst., 2015, 53, pp. 201–212. (doi: 10.1016/j.is.2014.12.001).
-
131)
-
193. Arroyo, J., Fernández, F.: ‘A genetic algorithm approach for the analysis of electric grid interdiction with line switching’. 15th Int. Conf. on Proc. Intelligent System Applications to Power Systems, 2009. ISAP'09, 2009, pp. 1–6.
-
132)
-
81. Liu, L., Esmalifalak, M., Ding, Q., et al: ‘Detecting false data injection attacks on power grid by sparse optimization’, IEEE Trans. Smart Grid, 2014, 5, (2), pp. 612–621 (doi: 10.1109/TSG.2013.2284438).
-
133)
-
199. Bakken, D.E., Bose, A., Hauser, C.H., et al: ‘Smart generation and transmission with coherent, real-time data’, Proc. IEEE, 2011, 99, (6), pp. 928–951 (doi: 10.1109/JPROC.2011.2116110).
-
134)
-
52. Yan, J., He, H., Sun, Y.: ‘Integrated security analysis on cascading failure in complex networks’, IEEE Trans. Inf. Forensics Sec., 2014, 9, (3), pp. 451–463 (doi: 10.1109/TIFS.2014.2299404).
-
135)
-
90. Liang, J., Sankar, L., Kosut, O.: ‘Vulnerability analysis and consequences of false data injection attack on power system state estimation’, IEEE Trans. Power Syst., 2016, 31, (5), pp. 3864–3872 (doi: 10.1109/TPWRS.2015.2504950).
-
136)
-
14. The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT): , 2016. .
-
137)
-
124. Xie, L., Mo, Y., Sinopoli, B.: ‘Integrity data attacks in power market operations’, IEEE Trans. Smart Grid, 2011, 2, (4), pp. 659–666 (doi: 10.1109/TSG.2011.2161892).
-
138)
-
129. Ye, H., Ge, Y., Liu, X., et al: ‘Transmission line rating attack in two-settlement electricity markets’, IEEE Trans. Smart Grid, 2016, 7, (3), pp. 1346–1355 (doi: 10.1109/TSG.2015.2426418).
-
139)
-
101. Liu, X., Li, Z.: ‘Local topology attacks in smart grids’, IEEE Trans. Smart Grid, 2016, PP, (99), pp. 1–10.
-
140)
-
3. Fang, X., Misra, S., Xue, G., Yang, D.: ‘Smart grid – The new and improved power grid: a survey’, IEEE Commun. Surv. Tutor., 2012, 14, (4), pp. 944–980 (doi: 10.1109/SURV.2011.101911.00087).
-
141)
-
148. Liu, X., Li, Z., Li, Z.: ‘Optimal protection strategy against false data injection attacks in power systems’, IEEE Trans. Smart Grid, 2016, PP, (99), pp. 1–1.
-
142)
-
42. Gungor, V.C., Sahin, D., Kocak, T., et al: ‘Smart grid technologies: communication technologies and standards’, IEEE Trans. Ind. Inf., 2011, 7, (4), pp. 529–539. (doi: 10.1109/TII.2011.2166794).
-
143)
-
56. Ten, C.W., Hong, J., Liu, C.C.: ‘Anomaly detection for cybersecurity of the substations’, IEEE Trans. Smart Grid, 2011, 2, (4), pp. 865–873 (doi: 10.1109/TSG.2011.2159406).
-
144)
-
187. Tang, B., Yan, J., Kay, S., et al: ‘Detection of false data injection attacks in smart grid under colored Gaussian noise’. , 2016.
-
145)
-
34. Zhu, Y., Yan, J., Tang, Y., et al: ‘The sequential attack against power grid networks’. Proc. 2014 IEEE Int. Conf. on Communications (ICC), 2014, pp. 616–621.
-
146)
-
19. Zeller, M.: ‘Common questions and answers addressing the aurora vulnerability’. 2011.
-
147)
-
15. Donde, V., Lopez, V., Lesieutre, B., et al: ‘Severe multiple contingency screening in electric power systems’, IEEE Trans. Power Syst., 2008, 2, (23), pp. 406–417 (doi: 10.1109/TPWRS.2008.919243).
-
148)
-
96. Deka, D., Baldick, R., Vishwanath, S.: ‘Jamming aided generalized data attacks: exposing vulnerabilities in secure estimation’. Proc. 2016 49th Hawaii Int. Conf. on System Sciences (HICSS), 2016, pp. 2556–2565.
-
149)
-
50. Bompard, E., Wu, D., Xue, F.: ‘Structural vulnerability of power systems: a topological approach’, Electr. Power Syst. Res., 2011, 81, (7), pp. 1334–1340 (doi: 10.1016/j.epsr.2011.01.021).
-
150)
-
9. Mo, Y., Weerakkody, S., Sinopoli, B.: ‘Physical authentication of control systems: designing watermarked control inputs to detect counterfeit sensor outputs’, IEEE Control Syst., 2015, 31, (1), pp. 93–109 (doi: 10.1109/MCS.2014.2364724).
-
151)
-
158. Guo, Y., Ten, C.W., Hu, S., et al: ‘Preventive maintenance for advanced metering infrastructure against malware propagation’, IEEE Trans. Smart Grid, 2016, 7, (3), pp. 1314–1328 (doi: 10.1109/TSG.2015.2453342).
-
152)
-
22. Liu, S., Liu, X.P., Saddik, A.E.: ‘Denial-of-service (DoS) attacks on load frequency control in smart grids’. Proc. Innovative Smart Grid Technologies (ISGT), 2013 IEEE PES, 2013, pp. 1–6.
-
153)
-
173. Zhang, Y., Wang, L., Sun, W., et al: ‘Distributed intrusion detection system in a multi-layer network architecture of smart grids’, IEEE Trans. Smart Grid, 2011, 2, (4), pp. 796–808 (doi: 10.1109/TSG.2011.2159818).
-
154)
-
15. National Institute of Standards and Technologies (NIST): ‘Guidelines for smart grid cybersecurity’ (NIST Special Publication, Gaithersburg, MD, 2014). .
-
155)
-
180. Jokar, P., Arianpoo, N., Leung, V.C.M.: ‘Electricity theft detection in AMI using customers's consumption patterns’, IEEE Trans. Smart Grid, 2016, 7, (1), pp. 216–226 (doi: 10.1109/TSG.2015.2425222).
-
156)
-
94. Kim, J., Tong, L., Thomas, R.J.: ‘Data framing attack on state estimation with unknown network parameters’. Proc. 2013 Asilomar Conf. on Signals, Systems and Computers, 2013, pp. 1388–1392.
-
157)
-
127. Choi, D.-H., Xie, L.: ‘Sensitivity analysis of real-time locational marginal price to SCADA sensor data corruption’, IEEE Trans. Power Syst., 2014, 29, (3), pp. 1110–1120 (doi: 10.1109/TPWRS.2013.2293634).
-
158)
-
202. Arritt, R.F., Dugan, R.C.: ‘Distribution system analysis and the future smart grid’, IEEE Trans. Ind. Appl., 2011, 47, (6), pp. 2343–2350 (doi: 10.1109/TIA.2011.2168932).
-
159)
-
98. Yuan, Y., Li, Z., Ren, K.: ‘Modeling load redistribution attacks in power systems’, IEEE Trans. Smart Grid, 2011, 2, (2), pp. 382–390 (doi: 10.1109/TSG.2011.2123925).
-
160)
-
60. Dondossola, G., Szanto, J., Masera, M., et al: ‘Effects of intentional threats to power substation control systems’, Int. J. Crit. Infrastruct., 2008, 4, (1–2), pp. 129–143 (doi: 10.1504/IJCIS.2008.016096).
-
161)
-
146. Deka, D., Baldick, R., Vishwanath, S.: ‘Data attack on strategic buses in the power grid: design and protection’. Proc. 2014 IEEE PES General Meeting — Conf. Exposition, 2014, pp. 1–5.
-
162)
-
78. Hao, J., Piechocki, R.J., Kaleshi, D., et al: ‘Sparse malicious false data injection attacks and defense mechanisms in smart grids’, IEEE Trans. Ind. Inf.s, 2015, 11, (5), pp. 1–12 (doi: 10.1109/TII.2015.2475695).
-
163)
-
44. Rosas-Casals, M., Valverde, S., Solé, R.V.: ‘Topological vulnerability of the European power grid under errors and attacks’, Int. J. Bifurcation Chaos, 2007, 17, (07), pp. 2465–2475 (doi: 10.1142/S0218127407018531).
-
164)
-
63. Liu, S., Feng, X., Kundur, D., et al: ‘Switched system models for coordinated cyber–physical attack construction and simulation’. 2011 IEEE First Int. Workshop on Proc. Smart Grid Modeling and Simulation (SGMS), 2011, pp. 49–54.
-
165)
-
116. Lisovich, M.A., Mulligan, D.K., Wicker, S.B.: ‘Inferring personal information from demand-response systems’, IEEE Sec. Priv., 2010, 8, (1), pp. 11–20 (doi: 10.1109/MSP.2010.40).
-
166)
-
64. Liu, S., Feng, X., Kundur, D., et al: ‘A class of cyber–physical switching attacks for power system disruption’. Proc.of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research, 2011, p. 16.
-
167)
-
22. Hahn, A., Govindarasu, M.: ‘Cyber attack exposure evaluation framework for the smart grid’, IEEE Trans. Smart Grid, 2011, 2, (4), pp. 835–843 (doi: 10.1109/TSG.2011.2163829).
-
168)
-
117. Mrmol, F.G., Sorge, C., Ugus, O., et al: ‘Do not snoop my habits: preserving privacy in the smart grid’, IEEE Commun. Mag., 2012, 50, (5), pp. 166–172 (doi: 10.1109/MCOM.2012.6194398).
-
169)
-
92. Kim, T., Wright, S.J., Bienstock, D., et al: ‘Vulnerability analysis of power systems’. , 2015.
-
170)
-
11. Chen, G., Dong, Z.Y., Hill, D.J., et al: ‘Exploring reliable strategies for defending power systems against targeted attacks’, IEEE Trans. Power Syst., 2011, 26, (3), pp. 1000–1009 (doi: 10.1109/TPWRS.2010.2078524).
-
171)
-
2. Lasseter, R.H.: ‘Smart distribution: coupled microgrids’, Proc. IEEE, 2011, 99, (6), pp. 1074–1082 (doi: 10.1109/JPROC.2011.2114630).
-
172)
-
191. Ma, C.Y.T., Yau, D.K.Y., Rao, N.S.V.: ‘Scalable solutions of Markov games for smart-grid infrastructure protection’, IEEE Trans. Smart Grid, 2013, 4, (1), pp. 47–55 (doi: 10.1109/TSG.2012.2223243).
-
173)
-
1. Barreto, C., Giraldo, J., Cardenas, A.A., et al: ‘Control systems for the power grid and their resiliency to attacks’, IEEE Secur. Priv., 2014, 12, (6), pp. 15–23 (doi: 10.1109/MSP.2014.111).
-
174)
-
47. Zhu, Y.H., Yan, J., Tang, Y.F., et al: ‘Resilience analysis of power grids under the sequential attack’, IEEE Trans. Inf. Forensics Sec., 2014, 9, (12), pp. 2340–2354 (doi: 10.1109/TIFS.2014.2363786).
-
175)
-
147. Deng, R., Xiao, G., Lu, R.: ‘Defending against false data injection attacks on power system state estimation’, IEEE Trans. Ind. Inf., 2015, PP, (99), pp. 1–1 (doi: 10.1109/TII.2015.2470218).
-
176)
-
84. Kim, J., Tong, L., Thomas, R.J.: ‘Subspace methods for data attack on state estimation: a data driven approach’, IEEE Trans. Signal Process., 2015, 63, (5), pp. 1102–1114 (doi: 10.1109/TSP.2014.2385670).
-
177)
-
111. Cleveland, F.M.: ‘Cybersecurity issues for advanced metering infrastructure (AMI)’. 2008 IEEE Proc. Power and Energy Society General Meeting – Conversion and Delivery of Electrical Energy in the 21st Century, 2008, pp. 1–5.
-
178)
-
23. Sargolzaei, A., Yen, K., Abdelghani, M.: ‘Delayed inputs attack on load frequency control in smart grid’. Proc. Innovative Smart Grid Technologies Conf. (ISGT), 2014 IEEE PES, 2014, pp. 1–5.
-
179)
-
66. Liu, S., Kundur, D., Zourntos, T., et al: ‘Coordinated variable structure switching attack in the presence of model error and state estimation’. 2012 IEEE Third Int. Conf. on Proc. Smart Grid Communications (SmartGridComm), 2012, pp. 318–323.
-
180)
-
7. Liu, X., Li, Z.: ‘Local load redistribution attacks in power systems with incomplete network information’, IEEE Trans. Smart Grid, 2014, 5, (4), pp. 1665–1676 (doi: 10.1109/TSG.2013.2291661).
-
181)
-
75. Liang, G., Zhao, J., Luo, F., et al: ‘A review of false data injection attacks against modern power systems’, IEEE Trans. Smart Grid, 2016, PP, (99), pp. 1–1.
-
182)
-
41. Yan, J., Tang, Y., He, H., et al: ‘Cascading failure analysis with DC power flow model and transient stability analysis’, IEEE Trans. Power Syst., 2015, 30, (1), pp. 285–297 (doi: 10.1109/TPWRS.2014.2322082).
-
183)
-
2. Sridhar, S., Hahn, A., Govindarasu, M.: ‘Cyber–physical system security for the electric power grid’, Proc. IEEE, 2012, 100, (1), pp. 210–224 (doi: 10.1109/JPROC.2011.2165269).
-
184)
-
58. Phillips, L.R., Tejani, B., Margulies, J., et al: ‘Analysis of operations and cybersecurity policies for a system of cooperating flexible alternating current transmission system (facts) devices’. 2005.
-
185)
-
8. Hug, G., Giampapa, J.A.: ‘Vulnerability assessment of AC state estimation with respect to false data injection cyber-attacks’, IEEE Trans. Smart Grid, 2012, 3, (3), pp. 1362–1370 (doi: 10.1109/TSG.2012.2195338).
-
186)
-
36. Bompard, E., Napoli, R., Xue, F.: ‘Extended topological approach for the assessment of structural vulnerability in transmission networks’, IET Gener. Transm. Distrib., 2010, 4, (6), pp. 716–724 (doi: 10.1049/iet-gtd.2009.0452).
-
187)
-
12. Srivastava, A., Morris, T., Ernster, T., et al: ‘Modeling cyber-physical vulnerability of the smart grid with incomplete information’, IEEE Trans. Smart Grid, 2013, 4, (1), pp. 235–244 (doi: 10.1109/TSG.2012.2232318).
-
188)
-
16. Zhao, L., Zeng, B.: ‘Vulnerability analysis of power grids with line switching’, , IEEE Trans. Power Syst., 2013, 28, (3), pp. 2727–2736 (doi: 10.1109/TPWRS.2013.2256374).
-
189)
-
183. Li, S., Ylmaz, Y., Wang, X.: ‘Quickest detection of false data injection attack in wide-area smart grids’, IEEE Trans. Smart Grid, 2015, 6, (6), pp. 2725–2735 (doi: 10.1109/TSG.2014.2374577).
-
190)
-
162. Lin, H., Slagell, A., Kalbarczyk, Z., et al: ‘Runtime semantic security analysis to detect and mitigate control-related attacks in power grids’, IEEE Trans. Smart Grid, 2016, PP, (99), pp. 1–1.
-
191)
-
165. Hong, J., Liu, C.C., Govindarasu, M.: ‘Integrated anomaly detection for cybersecurity of the substations’, IEEE Trans. Smart Grid, 2014, 5, (4), pp. 1643–1653 (doi: 10.1109/TSG.2013.2294473).
-
192)
-
2. Queiroz, C., Mahmood, A., Tari, Z.: ‘SCADASim—a framework for building SCADA simulations’, IEEE Trans. Smart Grid, 2011, 2, (4), pp. 589–597 (doi: 10.1109/TSG.2011.2162432).
-
193)
-
102. Liu, X., Li, Z.: ‘False data attacks against AC state estimation with incomplete network information’, IEEE Trans. Smart Grid, 2016, PP, (99), pp. 1–10.
-
194)
-
9. Arroyo, J.M., Galiana, F.D.: ‘On the solution of the bilevel programming formulation of the terrorist threat problem’, IEEE Trans. Power Syst., 2005, 20, (2), pp. 789–797 (doi: 10.1109/TPWRS.2005.846198).
-
195)
-
24. Sridhar, S., Govindarasu, M.: ‘Model-based attack detection and mitigation for automatic generation control’, IEEE Trans. Smart Grid, 2014, 5, (2), pp. 580–591 (doi: 10.1109/TSG.2014.2298195).
-
196)
-
125. Choi, D.H., Xie, L.: ‘Ramp-induced data attacks on look-ahead dispatch in real-time power markets’, IEEE Trans. Smart Grid, 2013, 4, (3), pp. 1235–1243 (doi: 10.1109/TSG.2012.2228508).
-
197)
-
18. Kundur, P., Balu, N.J., Lauby, M.G.: ‘Power system stability and control’ (McGraw-Hill, New York, 1994, 1st edn.).
-
198)
-
45. Wang, J.-W., Rong, L.-L.: ‘Cascade-based attack vulnerability on the US power grid’, Saf. Sci., 2009, 47, (10), pp. 1332–1336 (doi: 10.1016/j.ssci.2009.02.002).
-
199)
-
168. Pal, S., Sikdar, B., Chow, J.H.: ‘Detecting malicious manipulation of synchrophasor data’. Proc. 2015 IEEE Int. Conf. on Smart Grid Communications (Smart-GridComm), 2015, pp. 145–150.
-
200)
-
13. Yang, Q., Yang, J., Yu, W., et al: ‘On false data-injection attacks against power system state estimation: modeling and countermeasures’, IEEE Trans. Parallel Distrib. Syst., 2014, 25, (3), pp. 717–729 (doi: 10.1109/TPDS.2013.92).
-
201)
-
170. Fan, Y., Zhang, Z., Trinkle, M., et al: ‘A cross-layer defense mechanism against GPS spoofing attacks on PMUs in smart grids’, IEEE Trans. Smart Grid, 2015, 6, (6), pp. 2659–2668 (doi: 10.1109/TSG.2014.2346088).
-
202)
-
142. Ashok, A., Wang, P., Brown, M., et al: ‘Experimental evaluation of cyber attacks on automatic generation control using a CPS security testbed’. Proc. 2015 IEEE Power Energy Society General Meeting, 2015, pp. 1–5.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-cps.2016.0019
Related content
content/journals/10.1049/iet-cps.2016.0019
pub_keyword,iet_inspecKeyword,pub_concept
6
6