Automated vulnerability analysis of AC state estimation under constrained false data injection in electric power systems

Sicun Gao, Le Xie, Armando Solar-Lezama, Dimitrios Serpanos, Howard Shrobe

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Citations (Scopus)

Abstract

We introduce new methods for the automatic vulnerability analysis of power grids under false data injection attacks against nonlinear (AC) state estimation. We encode the analysis problems as logical decision problems that can be solved automatically by SMT solvers. To do so, we propose an analysis technique named symbolic propagation, which is inspired by symbolic execution methods for finding bugs and exploits in software programs. We show that the proposed methods can successfully analyze vulnerability of AC state estimation in realistic power grid models. Our approach is generalizable towards many other applications such as power flow analysis and state estimation.

Original languageEnglish
Title of host publicationProceedings of the IEEE Conference on Decision and Control
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages2613-2620
Number of pages8
Volume2016-February
ISBN (Print)9781479978861
DOIs
Publication statusPublished - 8 Feb 2016
Event54th IEEE Conference on Decision and Control, CDC 2015 - Osaka, Japan
Duration: 15 Dec 201518 Dec 2015

Other

Other54th IEEE Conference on Decision and Control, CDC 2015
CountryJapan
CityOsaka
Period15/12/1518/12/15

Fingerprint

Electric Power System
State Estimation
State estimation
Electric power systems
Vulnerability
Injection
Surface mount technology
Grid
Symbolic Execution
Nonlinear Estimation
Power Flow
Decision problem
Attack
Propagation
Software
False

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Modelling and Simulation
  • Control and Optimization

Cite this

Gao, S., Xie, L., Solar-Lezama, A., Serpanos, D., & Shrobe, H. (2016). Automated vulnerability analysis of AC state estimation under constrained false data injection in electric power systems. In Proceedings of the IEEE Conference on Decision and Control (Vol. 2016-February, pp. 2613-2620). [7402610] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/CDC.2015.7402610

Automated vulnerability analysis of AC state estimation under constrained false data injection in electric power systems. / Gao, Sicun; Xie, Le; Solar-Lezama, Armando; Serpanos, Dimitrios; Shrobe, Howard.

Proceedings of the IEEE Conference on Decision and Control. Vol. 2016-February Institute of Electrical and Electronics Engineers Inc., 2016. p. 2613-2620 7402610.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Gao, S, Xie, L, Solar-Lezama, A, Serpanos, D & Shrobe, H 2016, Automated vulnerability analysis of AC state estimation under constrained false data injection in electric power systems. in Proceedings of the IEEE Conference on Decision and Control. vol. 2016-February, 7402610, Institute of Electrical and Electronics Engineers Inc., pp. 2613-2620, 54th IEEE Conference on Decision and Control, CDC 2015, Osaka, Japan, 15/12/15. https://doi.org/10.1109/CDC.2015.7402610
Gao S, Xie L, Solar-Lezama A, Serpanos D, Shrobe H. Automated vulnerability analysis of AC state estimation under constrained false data injection in electric power systems. In Proceedings of the IEEE Conference on Decision and Control. Vol. 2016-February. Institute of Electrical and Electronics Engineers Inc. 2016. p. 2613-2620. 7402610 https://doi.org/10.1109/CDC.2015.7402610
Gao, Sicun ; Xie, Le ; Solar-Lezama, Armando ; Serpanos, Dimitrios ; Shrobe, Howard. / Automated vulnerability analysis of AC state estimation under constrained false data injection in electric power systems. Proceedings of the IEEE Conference on Decision and Control. Vol. 2016-February Institute of Electrical and Electronics Engineers Inc., 2016. pp. 2613-2620
@inproceedings{675ec5e8fd294a3ca16faa9b08885d21,
title = "Automated vulnerability analysis of AC state estimation under constrained false data injection in electric power systems",
abstract = "We introduce new methods for the automatic vulnerability analysis of power grids under false data injection attacks against nonlinear (AC) state estimation. We encode the analysis problems as logical decision problems that can be solved automatically by SMT solvers. To do so, we propose an analysis technique named symbolic propagation, which is inspired by symbolic execution methods for finding bugs and exploits in software programs. We show that the proposed methods can successfully analyze vulnerability of AC state estimation in realistic power grid models. Our approach is generalizable towards many other applications such as power flow analysis and state estimation.",
author = "Sicun Gao and Le Xie and Armando Solar-Lezama and Dimitrios Serpanos and Howard Shrobe",
year = "2016",
month = "2",
day = "8",
doi = "10.1109/CDC.2015.7402610",
language = "English",
isbn = "9781479978861",
volume = "2016-February",
pages = "2613--2620",
booktitle = "Proceedings of the IEEE Conference on Decision and Control",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

TY - GEN

T1 - Automated vulnerability analysis of AC state estimation under constrained false data injection in electric power systems

AU - Gao, Sicun

AU - Xie, Le

AU - Solar-Lezama, Armando

AU - Serpanos, Dimitrios

AU - Shrobe, Howard

PY - 2016/2/8

Y1 - 2016/2/8

N2 - We introduce new methods for the automatic vulnerability analysis of power grids under false data injection attacks against nonlinear (AC) state estimation. We encode the analysis problems as logical decision problems that can be solved automatically by SMT solvers. To do so, we propose an analysis technique named symbolic propagation, which is inspired by symbolic execution methods for finding bugs and exploits in software programs. We show that the proposed methods can successfully analyze vulnerability of AC state estimation in realistic power grid models. Our approach is generalizable towards many other applications such as power flow analysis and state estimation.

AB - We introduce new methods for the automatic vulnerability analysis of power grids under false data injection attacks against nonlinear (AC) state estimation. We encode the analysis problems as logical decision problems that can be solved automatically by SMT solvers. To do so, we propose an analysis technique named symbolic propagation, which is inspired by symbolic execution methods for finding bugs and exploits in software programs. We show that the proposed methods can successfully analyze vulnerability of AC state estimation in realistic power grid models. Our approach is generalizable towards many other applications such as power flow analysis and state estimation.

UR - http://www.scopus.com/inward/record.url?scp=84961990694&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84961990694&partnerID=8YFLogxK

U2 - 10.1109/CDC.2015.7402610

DO - 10.1109/CDC.2015.7402610

M3 - Conference contribution

SN - 9781479978861

VL - 2016-February

SP - 2613

EP - 2620

BT - Proceedings of the IEEE Conference on Decision and Control

PB - Institute of Electrical and Electronics Engineers Inc.

ER -