TY - GEN
T1 - Optimal False Data Injection Attack against Automatic Generation Control in Power Grids
AU - Tan, Rui
AU - Nguyen, Hoang Hai
AU - Foo, Eddy Y.S.
AU - Dong, Xinshu
AU - Yau, David K.Y.
AU - Kalbarczyk, Zbigniew T
AU - Iyer, Ravishankar K
AU - Gooi, Hoay Beng
N1 - Publisher Copyright:
© 2016 IEEE.
PY - 2016/5/25
Y1 - 2016/5/25
N2 - This paper studies false data injection attacks against automatic generation control (AGC), a fundamental control system used in all power grids to maintain the grid frequency at a nominal value. Attacks on the sensor measurements for AGC can cause frequency excursion that triggers remedial actions such as disconnecting customer loads or generators, leading to blackouts and potentially costly equipment damage. We derive an attack impact model and analyze an optimal attack, consisting of a series of false data injections, that minimizes the remaining time until the onset of remedial actions, leaving the shortest time for the grid to counteract. We show that, based on eavesdropped sensor data and a few feasible-to-obtain system constants, the attacker can learn the attack impact model and achieve the optimal attack in practice. This paper provides essential understanding on the limits of physical impact of false data injections on power grids, and provides an analysis framework to guide the protection of sensor data links. Our analysis and algorithms are validated by experiments on a physical 16-bus power system testbed and extensive simulations based on a 37-bus power system model.
AB - This paper studies false data injection attacks against automatic generation control (AGC), a fundamental control system used in all power grids to maintain the grid frequency at a nominal value. Attacks on the sensor measurements for AGC can cause frequency excursion that triggers remedial actions such as disconnecting customer loads or generators, leading to blackouts and potentially costly equipment damage. We derive an attack impact model and analyze an optimal attack, consisting of a series of false data injections, that minimizes the remaining time until the onset of remedial actions, leaving the shortest time for the grid to counteract. We show that, based on eavesdropped sensor data and a few feasible-to-obtain system constants, the attacker can learn the attack impact model and achieve the optimal attack in practice. This paper provides essential understanding on the limits of physical impact of false data injections on power grids, and provides an analysis framework to guide the protection of sensor data links. Our analysis and algorithms are validated by experiments on a physical 16-bus power system testbed and extensive simulations based on a 37-bus power system model.
UR - http://www.scopus.com/inward/record.url?scp=84978977542&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84978977542&partnerID=8YFLogxK
U2 - 10.1109/ICCPS.2016.7479109
DO - 10.1109/ICCPS.2016.7479109
M3 - Conference contribution
AN - SCOPUS:84978977542
T3 - 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems, ICCPS 2016 - Proceedings
BT - 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems, ICCPS 2016 - Proceedings
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 7th ACM/IEEE International Conference on Cyber-Physical Systems, ICCPS 2016
Y2 - 11 April 2016 through 14 April 2016
ER -