Download presentation
Presentation is loading. Please wait.
Published byΞΞΞ±Ξ½Ξ΄ΟΞΏΟ ΞΟ ΞΆΞ¬Ξ½ΟΞΉΞΏΟ Modified over 6 years ago
1
Vulnerability Analysis of False Data Injection
2
General control loop while(true){
π π = ππ¦ππππππ π πβ1 , C kβ1 , Ξπ‘ π π =π πππ ππ π π π π β² =ππ π‘ππππ‘ππ π π πΆ π =ππππ‘πππ( π π β² ) }
3
General control loop while(true){
π π = ππ¦ππππππ π πβ1 , C kβ1 , Ξπ‘ π π =π πππ ππ π π , π πβ1 β¦ π πβπ ,Ξπ‘ π π β² =ππ π‘ππππ‘ππ π π , π πβ1 β¦ π πβπ ,Ξπ‘ πΆ π =ππππ‘πππ( π π β² ,Ξπ‘) }
4
General control loop with monitor
while(true){ π π = ππ¦ππππππ π πβ1 , C kβ1 , Ξπ‘ π π =π πππ ππ π π ,Ξπ‘ π π β² =ππ π‘ππππ‘ππ π π ,Ξπ‘ If( Β¬π π ( π π β² β¦ π πβπ β² , π π β¦ π πβπ ,Ξπ‘)) π΄πΏπ΄π
π πΆ π =ππππ‘πππ( π π β² ,Ξπ‘) }
5
General control loop with safety property
while(true){ π π = ππ¦ππππππ π πβ1 , C kβ1 , Ξπ‘ π π =π πππ ππ π π ,Ξπ‘ π π β² =ππ π‘ππππ‘ππ π π ,Ξπ‘ If( Β¬π π ( π π β² β¦ π πβπ β² , π π β¦ π πβπ ,Ξπ‘)) π΄πΏπ΄π
π πΆ π =ππππ‘πππ( π π β² ,Ξπ‘) Assert( π ππ π πππ‘ ( π π )) }
6
In terms of predicates while(true){
π π = ππ¦ππππππ π πβ1 , C kβ1 , Ξπ‘ π π =π πππ ππ π π ,Ξπ‘ π π β² =ππ π‘ππππ‘ππ π π ,Ξπ‘ If(Β¬ π π ( π π β² β¦ π πβπ β² , π π β¦ π πβπ ,Ξπ‘)) π΄πΏπ΄π
π πΆ π =ππππ‘πππ( π π β² ,Ξπ‘) } π π π, π π , πΆ, π‘ π π π, π,t π β π, π β² ,π‘ π π π β² ,π,π‘ π π (πβ²,πΆ,π‘)
7
Independently controlled system
while(true){ π π = ππ¦ππππππ π πβ1 , Ξπ‘ π π =π πππ ππ π π ,Ξπ‘ π π β² =ππ π‘ππππ‘ππ π π ,Ξπ‘ If( Β¬π π ( π π β² β¦ π πβπ β² , π π β¦ π πβπ ,Ξπ‘)) π΄πΏπ΄π
π } π π π, π π ,π‘ π π π, π, π‘ π β π, π β² ,π‘ π π π β² ,π,π‘
8
Observability while(true){ π π = ππ¦ππππππ π πβ1 , Ξπ‘ π π =π πππ ππ π π ,Ξπ‘ π π β² =ππ π‘ππππ‘ππ π π ,Ξπ‘ If( Β¬π π ( π π β² β¦ π πβπ β² , π π β¦ π πβπ ,Ξπ‘)) π΄πΏπ΄π
π } π π π, π π ,π‘ π π π, π, π‘ π β π, π β² ,π‘ π π π β² , π π β² ,π,π‘ β π, π 0 , π π β² , π β² ,π β π‘β[0,π] π π β π π β² <πΏβ π π π, π π ,π‘ β§ π π π,π,π‘ β§ π β π, π β² ,π‘ β§ π π π β² , π π β² ,π,π‘ β πβ π β² <π
9
Observability while(true){ π π = ππ¦ππππππ π πβ1 , C kβ1 , Ξπ‘ π π =π πππ ππ π π ,Ξπ‘ π π β² =ππ π‘ππππ‘ππ π π ,Ξπ‘ If(Β¬ π π ( π π β² β¦ π πβπ β² , π π β¦ π πβπ ,Ξπ‘)) π΄πΏπ΄π
π πΆ π =ππππ‘πππ( π π β² ,Ξπ‘) } π π π, π π , πΆ, π‘ π π π, π,t π β π, π β² ,π‘ π π π β² , π π β² ,π,π‘ π π (πβ²,πΆ,π‘) β π, π 0 , π 0 β² , π β² ,πΆ,π β π‘β[0,π] π π β π π β² <πΏβ§ π π π π β² ,πΆ,π β π π π, π π ,πΆ,π‘ β§ π π π,π,π‘ β§ π β π, π β² ,π‘ β§ π π π β² , π π β² ,π,π‘ β πβ π β² <π
10
Chaining Time Steps Together
β π, π 0 , π 0 β² , π β² ,πΆ,π β π‘β[0,π] π π β π π β² <πΏβ§ π π π π β² ,πΆ,π β π π π, π π ,πΆ,π‘ β§ π π π,π,π‘ β§ π β π, π β² ,π‘ β§ π π π β² , π π β² ,π,π‘ β πβ π β² <π β πΏ,π, π 0 , π 0 β² , π β² ,πΆ,π β π‘β[0,π] π π β π π β² <πΏβ§ π π π π β² ,πΆ,π β π π π, π π ,πΆ,π‘ β§ π π π,π,π‘ β§ π β π, π β² ,π‘ β§ π π π β² , π π β² ,π,π‘ β πβ π β² < π π (πΏ) After k steps πβ π β² < π π π (πΏ)
11
FDI Security while(true){ π π = ππ¦ππππππ π πβ1 , C kβ1 , Ξπ‘ π π =π πππ ππ π π ,Ξπ‘ π π β² =ππ π‘ππππ‘ππ π π ,Ξπ‘ If(Β¬ π π ( π π β² β¦ π πβπ β² , π π β¦ π πβπ ,Ξπ‘)) π΄πΏπ΄π
π πΆ π =ππππ‘πππ( π π β² ,Ξπ‘) } π π π, π π , πΆ, π‘ π π π, π,t π β π, π β² ,π‘ π π π β² , π π β² ,π,π‘ π π (πβ²,πΆ,π‘) β π π ,π, π 0 , π 0 β² , π β² ,πΆ,π β π‘β[0,π] π π β π π β² <πΏβ§ π π π π β² ,πΆ,π β π π π, π π ,πΆ,π‘ β§ π π π,π,π‘ β§ π β π, π β² ,π‘ β§ π π π β² , π π β² ,π,π‘ β πβ π β² <π Attacker can replace π
12
FDI Security while(true){ π π = ππ¦ππππππ π πβ1 , C kβ1 , Ξπ‘ π π =π πππ ππ π π ,Ξπ‘ π π β² =ππ π‘ππππ‘ππ π π ,Ξπ‘ If(Β¬ π π ( π π β² β¦ π πβπ β² , π π β¦ π πβπ ,Ξπ‘)) π΄πΏπ΄π
π πΆ π =ππππ‘πππ( π π β² ,Ξπ‘) } π π π, π π , πΆ, π‘ π π π, π,t π β π, π β² ,π‘ π π π β² , π π β² ,π,π‘ π π (πβ²,πΆ,π‘) β π, π 0 , π 0 β² , π β² ,πΆ,π β π‘β[0,π] π π β π π β² <πΏβ§ π π π π β² ,πΆ,π β π π π, π π ,πΆ,π‘ β§ π π π,π,π‘ β§ π β π, π β² ,π‘ β§ π π π β² , π π β² ,π,π‘ β πβ π β² <π Attacker can feed arbitrary Z
13
Different security questions
Given a monitor, Identify configurations vulnerable to attack β π, π 0 , π 0 β² , π β² ,πΆ,π β π‘β[0,π] π π β π π β² <πΏβ§ π π π π β² ,πΆ,π β π π π, π π ,πΆ,π‘ β§ π π π,π,π‘ β§ π β π, π β² ,π‘ β§ π π π β² , π π β² ,π,π‘ β πβ π β² <π
14
Different security questions
Given a monitor, Identify configurations vulnerable to attack β π, π 0 , π 0 β² , π β² ,πΆ,π β π‘β[0,π] π π β π π β² <πΏβ§π( π 0 ,π, π 0 β² , π β² ,πΆ,π,π‘) β πβ π β² <π β π, π 0 , π 0 β² , π β² , π 1 , π 1 β² ,πΆ,π β π‘β[0,π] π π β π π β² <πΏβ§π π 0 , π 1 , π 0 β² , π 1 β² ,πΆ,π,π β§π( π 1 ,π, π 1 β² , π β² ,πΆ,π,π‘)β πβ π β² <π
15
Different security questions
Given a monitor, identify attack models for which you are safe β π, π 0 , π 0 β² , π β² ,πΆ,π β π‘β[0,π] π π β π π β² <πΏβ§ π π π π β² ,πΆ,π β π π π, π π ,πΆ,π‘ β§ π πβ² π,π,π‘ β§ π β π, π β² ,π‘ β§ π π π β² , π π β² ,π,π‘ β πβ π β² <π π πβ² π,π,π‘ = π π π+π,π,π‘ β§ π <π
16
Different security questions
Given a monitor, identify attack models for which you are safe β π, π 0 , π 0 β² , π β² ,πΆ,π β π‘β[0,π] π π β π π β² <πΏβ§ π π π π β² ,πΆ,π β π π π, π π ,πΆ,π‘ β§ π πβ² π,π,π‘ β§ π β π, π β² ,π‘ β§ π π π β² , π π β² ,π,π‘ β πβ π β² <π π πβ² π,π,π‘ = π π π+π,π,π‘ β§ π <π
17
Different security questions
Identify a monitor that guarantees safety β π π β π, π 0 , π 0 β² , π β² ,πΆ,π β π‘β[0,π] π π β π π β² <πΏβ§ π π π π β² ,πΆ,π β π π π, π π ,πΆ,π‘ β§ π πβ² π,π,π‘ β§ π β π, π β² ,π‘ β§ π π π β² , π π β² ,π,π‘ β πβ π β² <π π πβ² π,π,π‘ =ππ‘π‘πππππ ππππ π‘πππππ‘π
18
Power grid πΊ, π π£ , π π , π π , π π πΊ : Grid is a graph of Buses and directed connections π π£ ={ π£ π } π£ π is voltage magnitude on bus π π π ={ π π } π π is phase angle on bus π π π ={ π§ ππ π } Active power injection on wire (π,π) π π ={ π§ ππ π } Reactive power injections π§ ππ π = β ππ π ( π£ π , π£ π , π π , π π ) π§ ππ π = β ππ π π£ π , π£ π , π π , π π β ππ π π£ π , π£ π , π π , π π = π£ π 2 π ππ β π£ π π£ π π ππ cos π π β π π β π£ π π£ π π ππ sinβ‘( π π β π π ) β ππ π π£ π , π£ π , π π , π π = π£ π 2 π ππ β π£ π π£ π π ππ cos π π β π π β π£ π π£ π π ππ sinβ‘( π π β π π )
19
Power grid πΊ, π π£ , π π , π π , π π z π£ 1 π 1 π£ 2 π 2
πΊ, π π£ , π π , π π , π π πΊ : Grid is a graph of Buses and directed connections π π£ ={ π£ π } π£ π is voltage magnitude on bus π π π ={ π π } π π is phase angle on bus π π π ={ π§ ππ π } Active power injection on wire (π,π) π π ={ π§ ππ π } Reactive power injections z π£ 1 π 1 π£ 2 π 2 π π£ 1 , π 1 =βπ§β π£ 2 β π 2 (π§= π£ 1 2 β π£ 1 π£ 2 cos π 1 β π π β π£ 1 π£ 2 sin π 1 β π π )
20
Power Grid πΊ, π π£ , π π , π π , π π πΊ : Grid is a graph of Buses and directed connections π π£ ={ π£ π } π£ π is voltage magnitude on bus π π π ={ π π } π π is phase angle on bus π π π ={ π§ ππ π } Active power injection on wire (π,π) π π ={ π§ ππ π } Reactive power injections π§ ππ π = β ππ π π£ , π = π£ π πβ π π π£ π (β π ππ cos π π β π π β π ππ sinβ‘( π π β π π )) π§ ππ π = β ππ π π£ , π =π£ π πβ π π π£ π (β π ππ sin π π β π π β π ππ cosβ‘( π π β π π ))
21
State estimation An estimate π§ , π₯ is valid if itβs close enough to satisfying the equations Corresponds to π β in our general framework ππ π‘ π π§ , π₯ ββ π₯ π,πβπ΅(πΊ) π§ ππ π = β ππ π π₯ β§ π§ ππ π = β ππ π π₯ β§ π₯ β π₯ <π
22
Monitor If the state estimation is to far from satisfying the equations, we flag a problem ππ π π π₯ , π§ = π§ β β ( π₯ ) <π
23
Attack model Localized attacks Visibility
Attacker wants to introduce an error at a particular node Attacker injects errors to a subset of the grid Injected values must be consistent at the interface Visibility Can you directly see the values that you are trying to modify?
24
Incremental Algorithm
Initial subgrid contains only target node 1 If an attack is found, you are done If no attack is found, grow neighborhood Leverage results of UNSAT query to grow in a targeted way
25
Analysis time IEEE standard benchmarks. S = size of the full grid
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.