Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
Identifying vulnerabilities of state estimators against cyber-attacks
Date
2013-11-04
Author
Göl, Murat
Metadata
Show full item record
Item Usage Stats
155
views
0
downloads
Cite This
State estimation has an important role in the operation of power systems and associated power markets. It is well known that state estimators are vulnerable to any existing critical measurements since their errors cannot be detected. Therefore, by manipulating a finite number of critical measurements, a hacker can bias the results of state estimation without being detected. Those biased results include both system states (bus voltage magnitudes and angles) and branch flows that are calculated by using the system states. This work investigates the cyber-attacks carried out by strategically manipulating critical measurements and proposes a method to identify the set of estimated flows that are vulnerable to those cyber-attacks. The proposed method will be described and simulations will be presented to validate the method. The paper considers power systems that are measured by a mixed set of measurements, namely power flow, injection and voltage magnitude measurements, as well as phasor measurements provided by the phasor measurement units (PMUs).
Subject Keywords
State estimation
,
Cyber security
,
Critical measurements
,
PMU
URI
https://hdl.handle.net/11511/87237
https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6652124
http://apps.webofknowledge.com/full_record.do?product=WOS&search_mode=GeneralSearch&qid=59&SID=C4HwxkwcASPyNsmWoGY&page=1&doc=2&cacheurlFromRightClick=no
DOI
https://doi.org/10.1109/PTC.2013.6652124
Conference Name
IEEE Grenoble PowerTech (POWERTECH) Conference, Jun 16-20, 2013
Collections
Department of Electrical and Electronics Engineering, Conference / Seminar
Suggestions
OpenMETU
Core
Effective measurement design for cyber security
Göl, Murat (Institute of Electrical and Electronics Engineers Inc. (IEEE); 2015-02-12)
Cyber-attacks against power systems have been widely researched in recent years. Several studies have so far focused on ways of deceiving the state estimator so that the resulting estimates would be wrong. On the other hand, the role of network topology and measurement design on detectability of cyber-attacks has not been widely investigated. This work examines the measurements and network topology to identify vulnerabilities against targeted cyber-attacks. Specifically, it considers the leverage measuremen...
Rapid tracking of bus voltages using synchro phasor assisted state estimator
Göl, Murat; Floyd, Galvan (2012-10-10)
State estimation has a key role in secure operation of power systems and management of power markets. It calculates the optimal estimates of the system states using the available measurements. Increasing number of phasor measurement units (PMU) installed in power systems motivated their integration also into state estimators which so far relied solely on SCADA measurements. However, different refresh rates of PMU and SCADA measurements present a challenge in their efficient integration. This paper proposes ...
From the National Cyber Maturity to the Cyber Resilience: An Assessment of the Strategic Efforts of Turkey
Karabacak, Bilge; Tatar, Unal (2016-04-13)
In this paper, the details of critical infrastructure protection program of the United States of America are shared by taking the cyber resilience into account. The academic and institutional studies on the concepts of cyber maturity, critical infrastructure protection program and cyber resilience are explained in detail. By the help of these studies and national efforts, the relations among these concepts are set forth. The key components of a cyber security strategy and action plan for a cyber-resilient s...
Improved Situational Awareness for Power Distribution Systems Based on WLAV Estimator and Direct Load Flow Solution
Parlaktuna, Kemal; Dursun, Erk; Cinalioglu, Mustafa Cihan; Göl, Murat (2022-01-01)
With high renewable penetration, increasing popularity of electrical vehicles and rapid growth of electrical system especially in urban areas, modern distribution power systems are becoming more complex. Having situational awareness of the system is crucial for system operator both to have knowledge on the current state of the system and where to improve infrastructure. In this paper an application of a situational awareness tool for an active distribution power system is discussed. Improvements on the info...
National PQ monitoring network for Turkish electricity transmission system
Demirci, Turan; Kalaycioglu, Alper; Salor, Oezguel; Pakhuylu, Serkan; Dagli, Mehmet; Kara, Tugberk; Aksueyek, Hasan S.; Topcu, Cigdem; Polat, Beyhan; Bilgen, Semih; SEZEN, UMUT; Cadirci, Isik; Ermiş, Muammer (2007-05-03)
In this paper a nationwide power quality monitoring system, which computes and collects PQ parameters and the required waveforms at a power quality monitoring center for both the purposes of early warning and later analysis of power quality of the whole transmission system, is presented. The system consists of three basic units: PQ monitors connected to various transformer substations all over the country; a national PQ monitoring center which communicates with all PQ monitors regularly, receives PQ data an...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
M. Göl, “Identifying vulnerabilities of state estimators against cyber-attacks,” presented at the IEEE Grenoble PowerTech (POWERTECH) Conference, Jun 16-20, 2013, Grenoble, France, 2013, Accessed: 00, 2021. [Online]. Available: https://hdl.handle.net/11511/87237.