DOI QR코드

DOI QR Code

An Overview of False Data Injection Attack Against Cyber Physical Power System

사이버 물리 전력 시스템에 대한 허위 데이터 주입 공격에 관한 고찰

  • Bae, Junhyung (School of Electronic and Electrical Engineering, Daegu Catholic University)
  • Received : 2022.08.23
  • Accepted : 2022.09.13
  • Published : 2022.09.30

Abstract

With the evolution of technology, cyber physical systems (CPSs) are being upgraded, and new types of cyber attacks are being discovered accordingly. There are many forms of cyber attack, and all cyber attacks are made to manipulate the target systems. A representative system among cyber physical systems is a cyber physical power system (CPPS), that is, a smart grid. Smart grid is a new type of power system that provides reliable, safe, and efficient energy transmission and distribution. In this paper, specific types of cyber attacks well known as false data injection attacks targeting state estimation and energy distribution of smart grid, and protection strategies for defense of these attacks and dynamic monitoring for detection are described.

기술의 진화와 함께, 사이버 물리 시스템(Cyber Physical System)은 향상되고 있고 이에 따라 새로운 유형의 사이버 공격도 발견되고 있다. 사이버 공격에는 여러 가지 형태가 있으며 모든 사이버 공격은 대상 시스템을 조작하기 위해 이루어진다. 사이버 물리시스템 중 대표적인 시스템이 사이버 물리 전력 시스템, 즉 스마트 그리드이다. 스마트 그리드는 신뢰할 수 있고 안전하며 효율적인 에너지 전송 및 분배를 제공하는 새로운 유형의 전력망이다. 본 논문에서는 스마트 그리드의 상태 추정과 에너지 분배를 타깃으로 하는 허위 데이터 주입 공격(False Data Injection Attack)으로 잘 알려진 특정 유형의 사이버 공격 구성 방법과 이러한 공격의 방어를 위한 보호 전략과 탐지를 위한 동적 모니터링 기법을 소개한다.

Keywords

References

  1. S. Son, T. Park, and M. Won, "An Overview of Cyber Physical Systems," Telecommunications Review, Vol.24, No.4, pp.450-459, 2014. DOI: 10.1007/978-3-030-43494-6_1
  2. Y. Liu, P. Ning, and M.K. Reiter, "False Data Injection Attacks against State Estimation in Electric Power Grids," in Proc. of the 16th ACM Conf. Computer and Communications Security, Chicago, IL, 2009. DOI: 10.1145/1952982.1952995
  3. G. Liang, J. Zhao, F. Luo, and S. R. Weller, "A Review of False Data Injection Attacks against Modern Power Systems," IEEE Trans. Smart Grid, Vol.8, No.4, pp.1630-1638, 2017. DOI: 10.1109/TSG.2015.2495133
  4. Q. Wang, W. Tai, Y. Tang, and M. Ni, "Review of the false data injection attack against the cyber-physical power system," IET Cyber-Physical Systems: Theory & Applications, Vol.4, No.2, pp. 101-107, 2018. DOI: 10.1109/TSG.2015.2495133
  5. A. Abur, A.G. Exposito, Power System State Estimation: Theory and Implementation, Marcel Dekker, 2004.
  6. A. Monticelli, State Estimation in Electric Power Systems: A Generalized Approach, Kluwer Academic, 1999.
  7. O. Kosut, L. Jia, R. Thomas, and L. Tong, "Limiting False Data Attacks on Power System State Estimation," 44th Annual Conf. Information Sciences and Systems, pp.1-6, 2010. DOI: 10.1109/CISS.2010.5464816
  8. G. Dan, and H. Sandberg, "Stealth Attacks and Protection Schemes for State Estimators in Power Systems," IEEE Conf. Smart Grid Comm., pp.214-219, 2010. DOI: 10.1109/SMARTGRID.2010.5622046
  9. O. Kosut, L. Jia, R. Thomas, and L. Tong, "Malicious Data Attacks on the Smart Grid," IEEE Trans. Smart Grid, Vol.2, No.4, pp.645-658, 2011. DOI: 10.1109/TSG.2011.2163807
  10. A. Teixeira, S. Amin, H. Sandberg, K. H. Johansson, and S.S. Sastry, "Cyber Security Analysis of State Estimators in Electric Power Systems," Proc. IEEE Conf. Decision and Control, 2010. DOI: 10.1109/CDC.2010.5717318
  11. T. T. Kim, and H. V. Poor, "Strategic Protection Against Data Injection Attacks on Power Grids," IEEE Trans. Smart Grid, Vol.2, No.2, pp.326-333, 2011. DOI: 10.1109/TSG.2011.2119336
  12. G. Rigatos, D. Serpanos, and N. Zervos, "Detection of Attacks Against Power Grid Sensors Using Kalman Filter and Statistical Decision Making," IEEE Sensors Journal, Vol.17, No.23, pp.7641-7648, 2017. DOI: 10.1109/JSEN.2017.2661247
  13. D. B. Rawat, and C. Bajracharya, "Detection of False Data Injection Attacks in Smart Grid Communication Systems," IEEE Signal Processing Letters, Vol.22, No.10, pp.1652-1656, 2015. DOI: 10.1109/MCOM.2015.7045410
  14. A. Sargolzaei, K. Yazdani, A. Abbaspour, et al., "Detection and Mitigation of False Data Injection Attacks in Networked Control Systems," IEEE Trans. Industrial Informatics, Vol.16, No.6, pp. 4281-4292, 2020. DOI: 10.1109/IISR.2018.8535978