Sökning: id:"swepub:oai:DiVA.org:kth-158388" >
Efficient Computati...
Efficient Computations of a Security Index for False Data Attacks in Power Networks
-
- Hendrickx, Julien M. (författare)
- Universite catholique de Louvain
-
- Johansson, Karl Henrik (författare)
- KTH,Reglerteknik,ACCESS Linnaeus Centre,Kungliga Tekniska Högskolan (KTH),Royal Institute of Technology (KTH)
-
- Jungers, Raphael M. (författare)
- Universite catholique de Louvain
-
visa fler...
-
- Sandberg, Henrik (författare)
- KTH,Reglerteknik,ACCESS Linnaeus Centre,Kungliga Tekniska Högskolan (KTH),Royal Institute of Technology (KTH)
-
- Sou, Kin Cheong, 1979 (författare)
- Gothenburg University,Göteborgs universitet,Institutionen för matematiska vetenskaper, matematik,Department of Mathematical Sciences, Mathematics
-
visa färre...
-
(creator_code:org_t)
- 2014
- 2014
- Engelska.
-
Ingår i: IEEE Transactions on Automatic Control. - 0018-9286 .- 1558-2523. ; 59:12, s. 3194-3208
- Relaterad länk:
-
http://dx.doi.org/10...
-
visa fler...
-
https://urn.kb.se/re...
-
https://doi.org/10.1...
-
https://research.cha...
-
https://gup.ub.gu.se...
-
visa färre...
Abstract
Ämnesord
Stäng
- The resilience of Supervisory Control and Data Acquisition (SCADA) systems for electric power networks for certain cyber-attacks is considered. We analyze the vulnerability of the measurement system to false data attack on communicated measurements. The vulnerability analysis problem is shown to be NP-hard, meaning that unless P = NP there is no polynomial time algorithm to analyze the vulnerability of the system. Nevertheless, we identify situations, such as the full measurement case, where the analysis problem can be solved efficiently. In such cases, we show indeed that the problem can be cast as a generalization of the minimum cut problem involving nodes with possibly nonzero costs. We further show that it can be reformulated as a standard minimum cut problem (without node costs) on a modified graph of proportional size. An important consequence of this result is that our approach provides the first exact efficient algorithm for the vulnerability analysis problem under the full measurement assumption. Furthermore, our approach also provides an efficient heuristic algorithm for the general NP-hard problem. Our results are illustrated by numerical studies on benchmark systems including the IEEE 118-bus system.
Ämnesord
- TEKNIK OCH TEKNOLOGIER -- Elektroteknik och elektronik -- Reglerteknik (hsv//swe)
- ENGINEERING AND TECHNOLOGY -- Electrical Engineering, Electronic Engineering, Information Engineering -- Control Engineering (hsv//eng)
Nyckelord
- Mathematical programming
- network theory (graph)
- power system security
- SCADA systems
- smart grids
- Mathematical programming; network theory (graph); power system security; SCADA systems; smart grids
Publikations- och innehållstyp
- ref (ämneskategori)
- art (ämneskategori)
Hitta via bibliotek
Till lärosätets databas