Detection of False-data Injection Attacks in Cyber-Physical DC Microgrids (bibtex)
by , ,
Abstract:
Power electronics-intensive DC microgrids use increasingly complex software-based controllers and communication networks. They are evolving into cyber-physical systems (CPS) with sophisticated interactions between physical and computational processes, making them vulnerable to cyber attacks. This work presents a framework to detect possible false-data injection attacks (FDIA) in cyber-physical DC microgrids. The detection problem is formalized as identifying a change in sets of inferred candidate invariants. Invariants are microgrids properties that do not change over time. Both the physical plant and the software controller of CPS can be described as Simulink/Stateflow (SLSF) diagrams. The dynamic analysis infers the candidate invariants over the input/output variables of SLSF components. The reachability analysis generates the sets of reachable states (reach sets) for the CPS modeled as hybrid automata. The candidate invariants that contain the reach sets are called the actual invariants. The candidate invariants are then compared with the actual invariants, and any mismatch indicates the presence of FDIA. To evaluate the proposed methodology, the hybrid automaton of a DC microgrid, with a distributed cooperative control scheme, is presented. The reachability analysis is performed to obtain the reach sets and, hence, the actual invariants. Moreover, a prototype tool, HYbrid iNvariant GEneratoR (Hynger), is extended to instrument SLSF models, obtain candidate invariants, and identify FDIA.
Reference:
Omar Ali Beg, Taylor T. Johnson, Ali Davoudi, "Detection of False-data Injection Attacks in Cyber-Physical DC Microgrids", In IEEE Transactions on Industrial Informatics, vol. , no. , pp. , 2017, .
Bibtex Entry:
@ARTICLE{beg2017tii, 
author={Omar Ali Beg and Taylor T. Johnson and Ali Davoudi}, 
journal={IEEE Transactions on Industrial Informatics}, 
title={Detection of False-data Injection Attacks in Cyber-Physical DC Microgrids}, 
year={2017}, 
volume={}, 
number={}, 
pages={}, 
abstract={Power electronics-intensive DC microgrids use increasingly complex software-based controllers and communication networks. They are evolving into cyber-physical systems (CPS) with sophisticated interactions between physical and computational processes, making them vulnerable to cyber attacks. This work presents a framework to detect possible false-data injection attacks (FDIA) in cyber-physical DC microgrids. The detection problem is formalized as identifying a change in sets of inferred candidate invariants. Invariants are microgrids properties that do not change over time. Both the physical plant and the software controller of CPS can be described as Simulink/Stateflow (SLSF) diagrams. The dynamic analysis infers the candidate invariants over the input/output variables of SLSF components. The reachability analysis generates the sets of reachable states (reach sets) for the CPS modeled as hybrid automata. The candidate invariants that contain the reach sets are called the actual invariants. The candidate invariants are then compared with the actual invariants, and any mismatch indicates the presence of FDIA. To evaluate the proposed methodology, the hybrid automaton of a DC microgrid, with a distributed cooperative control scheme, is presented. The reachability analysis is performed to obtain the reach sets and, hence, the actual invariants. Moreover, a prototype tool, HYbrid iNvariant GEneratoR (Hynger), is extended to instrument SLSF models, obtain candidate invariants, and identify FDIA.}, 
keywords={Automata;Communication networks;Hybrid power systems;Microgrids;Phasor measurement units;Security;Topology;Cyber-physical systems;dc microgrid;distributed control;false-data injection attack;hybrid automaton}, 
doi={10.1109/TII.2017.2656905}, 
ISSN={1551-3203}, 
month={},}
Powered by bibtexbrowser