On Security Indices for State Estimators in Power Networks Henrik Sandberg, André Teixeira, and Karl Henrik Johansson Automatic Control Lab, ACCESS Linnaeus.

Slides:



Advertisements
Similar presentations
Minimizing Probing Cost for Detecting Interface Failures: Algorithms and Scalability Analysis Hung Nguyen (Univ. of Adelaide, Australia) Renata Teixeira.
Advertisements

Principal Component Analysis Based on L1-Norm Maximization Nojun Kwak IEEE Transactions on Pattern Analysis and Machine Intelligence, 2008.
Support Vector Machines
Presenter: Raghu Ranganathan ECE / CMR Tennessee Technological University March 22th, 2011 Smart grid seminar series Yao Liu, Peng Ning, and Michael K.
Converging Dynamical Networks with Applications to Peer-to-peer Video Streaming and Social Networks Håkan Terelius, Guodong Shi, Ather Gattami, Karl H.
© 2011 Autodesk Freely licensed for use by educational institutions. Reuse and changes require a note indicating that content has been modified from the.
Progress in Linear Programming Based Branch-and-Bound Algorithms
EE 369 POWER SYSTEM ANALYSIS
CISE301_Topic3KFUPM1 SE301: Numerical Methods Topic 3: Solution of Systems of Linear Equations Lectures 12-17: KFUPM Read Chapter 9 of the textbook.
1 Observers Data Only Fault Detection Bo Wahlberg Automatic Control Lab & ACCESS KTH, SWEDEN André C. Bittencourt Department of Automatic Control UFSC,
On the Conditional Mutual Information in Gaussian- Markov Structured Grids Hanie Sedghi & Edmond Jonckheere.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
Volkan Cevher, Marco F. Duarte, and Richard G. Baraniuk European Signal Processing Conference 2008.
Support Vector Machines (SVMs) Chapter 5 (Duda et al.)
Attitude Determination - Using GPS. 20/ (MJ)Danish GPS Center2 Table of Contents Definition of Attitude Attitude and GPS Attitude Representations.
ECE 530 – Analysis Techniques for Large-Scale Electrical Systems Prof. Hao Zhu Dept. of Electrical and Computer Engineering University of Illinois at Urbana-Champaign.
1 In-Network PCA and Anomaly Detection Ling Huang* XuanLong Nguyen* Minos Garofalakis § Michael Jordan* Anthony Joseph* Nina Taft § *UC Berkeley § Intel.
Distributed Regression: an Efficient Framework for Modeling Sensor Network Data Carlos Guestrin Peter Bodik Romain Thibaux Mark Paskin Samuel Madden.
Contributed Talk at NetSci 2007
Distributed localization in wireless sensor networks
Computing Sketches of Matrices Efficiently & (Privacy Preserving) Data Mining Petros Drineas Rensselaer Polytechnic Institute (joint.
ECE 530 – Analysis Techniques for Large-Scale Electrical Systems
Mujahed AlDhaifallah (Term 342) Read Chapter 9 of the textbook
1 Systems of Linear Equations Error Analysis and System Condition.
05 August 2015 Delft University of Technology Electrical Power System Essentials ET2105 Electrical Power System Essentials Prof. Lou van der Sluis Energy.
Arithmetic Operations on Matrices. 1. Definition of Matrix 2. Column, Row and Square Matrix 3. Addition and Subtraction of Matrices 4. Multiplying Row.
LIAL HORNSBY SCHNEIDER
A project under the 7th Framework Programme CPS Workshop Stockholm 12/04/2010 Gunnar Björkman Project Coordinator A Security Project for the Protection.
Matrix Solution of Linear Systems The Gauss-Jordan Method Special Systems.
1 SVY207: Lecture 18 Network Solutions Given many GPS solutions for vectors between pairs of observed stations Compute a unique network solution (for many.
Row 1 Row 2 Row 3 Row m Column 1Column 2Column 3 Column 4.
Copyright © 2013, 2009, 2005 Pearson Education, Inc. 1 5 Systems and Matrices Copyright © 2013, 2009, 2005 Pearson Education, Inc.
Optimal Power Flow: Closing the Loop over Corrupted Data André Teixeira, Henrik Sandberg, György Dán, and Karl H. Johansson ACCESS Linnaeus Centre, KTH.
EDGE DETECTION IN COMPUTER VISION SYSTEMS PRESENTATION BY : ATUL CHOPRA JUNE EE-6358 COMPUTER VISION UNIVERSITY OF TEXAS AT ARLINGTON.
Compressive Sensing for Multimedia Communications in Wireless Sensor Networks By: Wael BarakatRabih Saliba EE381K-14 MDDSP Literary Survey Presentation.
Phase Congruency Detects Corners and Edges Peter Kovesi School of Computer Science & Software Engineering The University of Western Australia.
1 11th DSP Workshop Taos Ski Valley, NM 2004 Centered Discrete Fractional Fourier Transform & Linear Chirp Signals Balu Santhanam & Juan G. Vargas- Rubio.
1 P. David, V. Idasiak, F. Kratz P. David, V. Idasiak, F. Kratz Laboratoire Vision et Robotique, UPRES EA 2078 ENSI de Bourges - Université d'Orléans 10.
Chapter 2 System of Linear Equations Sensitivity and Conditioning (2.3) Solving Linear Systems (2.4) January 19, 2010.
©2009 Mladen Kezunovic. Improving Relay Performance By Off-line and On-line Evaluation Mladen Kezunovic Jinfeng Ren, Chengzong Pang Texas A&M University,
Sparse Signals Reconstruction Via Adaptive Iterative Greedy Algorithm Ahmed Aziz, Ahmed Salim, Walid Osamy Presenter : 張庭豪 International Journal of Computer.
A Trust Based Distributed Kalman Filtering Approach for Mode Estimation in Power Systems Tao Jiang, Ion Matei and John S. Baras Institute for Systems Research.
Biointelligence Laboratory, Seoul National University
Bundle Adjustment A Modern Synthesis Bill Triggs, Philip McLauchlan, Richard Hartley and Andrew Fitzgibbon Presentation by Marios Xanthidis 5 th of No.
EE515/IS523: Security 101: Think Like an Adversary Evading Anomarly Detection through Variance Injection Attacks on PCA Benjamin I.P. Rubinstein, Blaine.
Statistical Data Analysis 2010/2011 M. de Gunst Lecture 10.
Warm Up Perform the indicated operations. If the matrix does not exist, write impossible
Ahmad Salam AlRefai.  Introduction  System Features  General Overview (general process)  Details of each component  Simulation Results  Considerations.
ECE 530 – Analysis Techniques for Large-Scale Electrical Systems Prof. Hao Zhu Dept. of Electrical and Computer Engineering University of Illinois at Urbana-Champaign.
1. 2  Introduction  Array Operations  Number of Elements in an array One-dimensional array Two dimensional array Multi-dimensional arrays Representation.
Network Anomography Yin Zhang Joint work with Zihui Ge, Albert Greenberg, Matthew Roughan Internet Measurement.
ECE 530 – Analysis Techniques for Large-Scale Electrical Systems Prof. Hao Zhu Dept. of Electrical and Computer Engineering University of Illinois at Urbana-Champaign.
The Message Passing Communication Model David Woodruff IBM Almaden.
1 Numerical Methods Solution of Systems of Linear Equations.
Support Vector Machines (SVMs) Chapter 5 (Duda et al.) CS479/679 Pattern Recognition Dr. George Bebis.
Artificial Intelligence In Power System Author Doshi Pratik H.Darakh Bharat P.
Automation Technologies SCADA SENSORS HMI
Linear Algebra review (optional)
Hidden Moving Target Defense in Smart Grids
Non-additive Security Games
Secure Control Systems - A Quantitative Risk Management Approach
7.3 Matrices.
[ ] [ ] [ ] [ ] EXAMPLE 3 Scalar multiplication Simplify the product:
Identification of Wiener models using support vector regression
Multiport, Multichannel Transmission Line: Modeling and Synthesis
EE362G Smart Grids: Introduction to State Estimation
Solving Linear Systems: Iterative Methods and Sparse Systems
Linear Algebra review (optional)
Outline Sparse Reconstruction RIP Condition
Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems NDSS 2019 Hadi Abdullah, Washington Garcia, Christian Peeters, Patrick.
Presentation transcript:

On Security Indices for State Estimators in Power Networks Henrik Sandberg, André Teixeira, and Karl Henrik Johansson Automatic Control Lab, ACCESS Linnaeus Center Royal Institute of Technology, Stockholm, Sweden First Workshop on Secure Control Systems April 12 th, 2010

Northeast U.S. Blackout of 2003 August 14 th, 2003: 55 million people affected One plant in Ohio offline during peak hour ) Cascading failure ) Over 100 plants shut down Software bug in state estimator stalled alarm systems for over an hour Incorrect state estimate can have serious consequences

SCADA Systems and False-Data Deception Attacks SCADA/EMS systems used to monitor and control power networks Sampling frequency ¼ 1/min Redundant power flow and voltage measurements (z i ) State estimator used to obtain accurate state information at all times, and to identify faulty equipment. (SCADA/EMS = Supervisory Control and Data Acquisition/Energy Management Systems)

Attacker Model and Bad Data Detection in Control Center Intelligent attacker can find attacks a that do not trigger alarms in the Bad-Data Detector (BDD) [Liu et al., 2009] But can we measure how difficult it is to perform such attacks?

Steady-state models: WLS-Estimates of bus phase angles  i (in vector ): Linear approximation: Power Network and Estimator Models

Bad-Data Detection and Undetectable Attacks The “hat matrix” K: Bad-Data Detection triggers on anomalies in the residual False-data deception attacks [Liu et al., 2009]: The attacker has a lot of freedom in the choice of attack vector a! Which a are more likely to be applied?

Measures of “least-effort attacks” on measurement z k Large indices  k and  k ) It requires a large coordinated attack involving many sensors and large elements in a to attack z k (  i |a i | ¸  k |a k |) More generally: The New Security Indices  k and  k

Example of the Index  k Attack vectors corresponding to  k : Compare with the hat matrix:

IEEE 14-bus Network

IEEE 14-bus Network (cont’d) Hat-matrix-based heuristics () misleading when it comes to judging sparsity of attacks (  k ) Heuristic OK to estimate size of elements in a (  k ) (ο)  k upper bound () r k 1 :=#{|K ik /K kk | ¸ 0.33} (ο)  k ()

IEEE 14-bus Attack Vectors (z 16 )

Conclusions Security of state estimators has not been much studied before Two security indices (  k,  k ) introduced here Can be used to locate measurements that are relatively easy to attack The hat matrix K can be misleading with respect to security of measurements Efficient computation of  k ? How to re-design system to maximize the indices?

References

4-Bus Example Hat matrix: Many non-zero elements in rows ) Large measurement redundancy (except z 4 ) z 1, z 2, z 3, z 5 have lots of redundancy. But are they all hard to attack? No!

Attack Synthesis for Measurement z k When p=2, the columns of scaled hat matrix (R=I) gives the solution [Teixeira et al., 2010]: This study: Sparse attacks a more likely, since they involve fewer sensors. Study p=0 and p=1

Some Possible Extensions Increase risk of detection with  Multiple attack goals Sensitivity matrix S=I-K Lagrange multipliers and location of encryption devices?