On detecting false data injection with limited network information using transformation based statistical techniques

Kush Khanna, Sandeep Kumar Singh, Bijaya Ketan Panigrahi, Ranjan Bose, Anupam Joshi

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

9 Scopus citations

Abstract

Cyber-attacks poses a serious threat to power system operation. False data injection attack (FDIA) is one such severe threat, if wisely constructed, can cause flawed estimation of power system states, thereby, leading to uneconomical and unsecured operation of power system. In recent years many methods are proposed to secure the smart grid against malicious cyber-events by protecting certain critical measurement sensors. However, making a system completely hack-proof is rather idealistic. In this paper, in addition to the research carried out in this space, we present a new Log transformation based method to detect the FDIA in real time with high probability. The detection probability of the proposed scheme is compared with existing method using IEEE 14 bus system.

Original languageEnglish
Title of host publication2017 IEEE Power and Energy Society General Meeting, PESGM 2017
PublisherIEEE Computer Society
Pages1-5
Number of pages5
ISBN (Electronic)9781538622124
DOIs
StatePublished - Jan 29 2018
Externally publishedYes
Event2017 IEEE Power and Energy Society General Meeting, PESGM 2017 - Chicago, United States
Duration: Jul 16 2017Jul 20 2017

Publication series

NameIEEE Power and Energy Society General Meeting
Volume2018-January
ISSN (Print)1944-9925
ISSN (Electronic)1944-9933

Conference

Conference2017 IEEE Power and Energy Society General Meeting, PESGM 2017
Country/TerritoryUnited States
CityChicago
Period07/16/1707/20/17

Keywords

  • Cyber security
  • False data injection
  • Kullback-Leibler distance
  • Log transformation
  • Smart grid

Fingerprint

Dive into the research topics of 'On detecting false data injection with limited network information using transformation based statistical techniques'. Together they form a unique fingerprint.

Cite this