Toggle Main Menu Toggle Search

Open Access padlockePrints

False data injection in distribution system: Attacker's perspective

Lookup NU author(s): Dr Anurag Sharma

Downloads

Full text for this publication is not currently held within this repository. Alternative links are provided below where available.


Abstract

© 2024 Elsevier B.V. The distribution system is digitizing and occupying cyberspace with the help of information and communication technologies (ICTs). It is vulnerable to cyber-attacks like false data injection (FDI) and denial-of-services (DoS). However, limited research on cyber-attacks in the distribution system is reported in the literature, and these attacks are of serious concern to distribution system operators (DSOs). The DSO's primary challenge is to understand the attacker's perspective for FDI attack construction. Thus, the work presented in this paper aims to provide an in-depth insight for DSO to apprehend the attacker's perspective, attack flow, and the nature of the FDI attack vector. The prior knowledge of attack flow to DSO can help to protect critical infrastructures from cyber-attacks. Thus, this work comprehends the attacker's behaviour for deploying the optimal budget to disrupt the distribution system operation therein by injecting a stealthy FDI vector. The attacker is resource-constrained in terms of budget and network information. Therefore, the optimal budget for attack initiation is proposed and formulated as a multi-objective optimization problem to minimize the investment and maximize the economic loss for the DSO. Constructing the attack vectors for the attacker is challenging in the limited network information. It is complex because of network characteristics such as multi-phase configurations & an unbalanced nature, and higher resistance to reactance (r/x) ratio. Thus, the FDI attack vector construction is proposed based on non-linear programming optimization and sensitivity analysis considering partial information from the distribution system. The simulation results are presented and compared with available methods in the literature to validate the efficacy of the proposed methods.


Publication metadata

Author(s): Bhattar PL, Pindoriya NM, Sharma A

Publication type: Article

Publication status: Published

Journal: International Journal of Critical Infrastructure Protection

Year: 2024

Volume: 45

Print publication date: 01/07/2024

Online publication date: 02/03/2024

Acceptance date: 25/02/2024

ISSN (print): 1874-5482

ISSN (electronic): 2212-2087

Publisher: Elsevier BV

URL: https://doi.org/10.1016/j.ijcip.2024.100672

DOI: 10.1016/j.ijcip.2024.100672


Altmetrics

Altmetrics provided by Altmetric


Share