Download Now Free registration required
Malicious attacks against power systems are investigated, in which an adversary controls a set of meters and is able to alter the measurements from those meters. Two regimes of attacks are considered. The strong attack regime is where the adversary attacks a sufficient number of meters so that the network state becomes unobservable by the control center. For attacks in this regime, the smallest set of attacked meters capable of causing network unobservability is characterized using a graph theoretic approach. By casting the problem as one of minimizing a super-modular graph functional, the problem of identifying the smallest set of vulnerable meters is shown to have polynomial complexity.
- Format: PDF
- Size: 334.37 KB