SwePub
Sök i LIBRIS databas

  Extended search

onr:"swepub:oai:DiVA.org:kth-278778"
 

Search: onr:"swepub:oai:DiVA.org:kth-278778" > Feasibility of Time...

  • 1 of 1
  • Previous record
  • Next record
  •    To hitlist

Feasibility of Time-Synchronization Attacks Against PMU-Based State Estimation

Shereen, Ezzeldin (author)
KTH,Nätverk och systemteknik
Delcourt, Marguerite (author)
Swiss Fed Inst Technol Lausanne EPFL, Sch Comp & Commun Sci, CH-1015 Lausanne, Switzerland.
Barreto, Sergio (author)
Swiss Fed Inst Technol Lausanne EPFL, Sch Comp & Commun Sci, CH-1015 Lausanne, Switzerland.;Cisco Syst, Core Software Grp, CH-1015 Lausanne, Switzerland.
show more...
Dán, György (author)
KTH,Nätverk och systemteknik
Le Boudec, Jean-Yves (author)
Swiss Fed Inst Technol Lausanne EPFL, Sch Comp & Commun Sci, CH-1015 Lausanne, Switzerland.
Paolone, Mario (author)
Swiss Fed Inst Technol Lausanne EPFL, Sch Engn, CH-1015 Lausanne, Switzerland.
show less...
 (creator_code:org_t)
Institute of Electrical and Electronics Engineers (IEEE), 2020
2020
English.
In: IEEE Transactions on Instrumentation and Measurement. - : Institute of Electrical and Electronics Engineers (IEEE). - 0018-9456 .- 1557-9662. ; 69:6, s. 3412-3427
  • Journal article (peer-reviewed)
Abstract Subject headings
Close  
  • The emerging measurement technology of phasor measurement units (PMUs) makes it possible to estimate the state of electrical grids in real time, thus opening the way to new protection and control applications. PMUs rely on precise time synchronization; therefore, they are vulnerable to time-synchronization attacks (TSAs), which alter the measured voltage and current phases. In particular, undetectable TSAs pose a significant threat as they lead to an incorrect but credible estimate of the system state. Prior work has shown that such attacks exist against pairs of PMUs, but they do not take into consideration the clock adjustment performed by the clock servo, which can modify the attack angles and make the attacks detectable. This cannot be easily addressed with the existing attacks, as the undetectable angle values form a discrete set and cannot be continuously adjusted as would be required to address the problems posed to the attacker by the clock servo. Going beyond prior work, this article first shows how to perform undetectable attacks against more than two PMUs, so that the set of undetectable attacks forms a continuum and supports small adjustments. Second, it shows how an attacker can anticipate the operation of the clock servo while achieving her attack goal and remaining undetectable. Third, this article shows how to identify vulnerable sets of PMUs. Numerical results on the 39-bus IEEE benchmark system illustrate the feasibility of the proposed attack strategies.

Subject headings

TEKNIK OCH TEKNOLOGIER  -- Elektroteknik och elektronik -- Kommunikationssystem (hsv//swe)
ENGINEERING AND TECHNOLOGY  -- Electrical Engineering, Electronic Engineering, Information Engineering -- Communication Systems (hsv//eng)

Keyword

Clock servo
cyber-security
false data injection attack
phasor measurement unit (PMU)
power system state estimation
time synchronization attack (TSA)

Publication and Content Type

ref (subject category)
art (subject category)

Find in a library

To the university's database

  • 1 of 1
  • Previous record
  • Next record
  •    To hitlist

Search outside SwePub

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view