Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017, Article ID 9602357, 12 pages
https://doi.org/10.1155/2017/9602357
Research Article

F-DDIA: A Framework for Detecting Data Injection Attacks in Nonlinear Cyber-Physical Systems

1Department of Computer Science, University of Hong Kong, Pokfulam Road, Hong Kong
2Peking University, Beijing, China

Correspondence should be addressed to Jingxuan Wang; moc.liamg@nauxgnijgnawgnokgnoh

Received 10 April 2017; Accepted 7 June 2017; Published 10 August 2017

Academic Editor: Leo Y. Zhang

Copyright © 2017 Jingxuan Wang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. R. Langner, “Stuxnet: dissecting a cyberwarfare weapon,” IEEE Security and Privacy, vol. 9, no. 3, pp. 49–51, 2011. View at Publisher · View at Google Scholar · View at Scopus
  2. Y. Liu, P. Ning, and M. K. Reiter, “False data injection attacks against state estimation in electric power grids,” ACM Transactions on Information and System Security, vol. 14, no. 1, article 13, 2011. View at Publisher · View at Google Scholar · View at Scopus
  3. J. Kim, L. Tong, and R. J. Thomas, “Data framing attack on state estimation,” IEEE Journal on Selected Areas in Communications, vol. 32, no. 7, pp. 1460–1470, 2014. View at Publisher · View at Google Scholar · View at Scopus
  4. J. Wang, L. C. K. Hui, S. M. Yiu, X. Cui, E. K. Wang, and J. Fang, “A survey on the cyber attacks against non-linear state estimation in smart grids,” in Proceedings of the Australasian Conference on Information Security and Privacy (ACISP '16), Springer, Berlin, Germany, 2016.
  5. J. Wang, L. C. K. Hui, S. M. Yiu, E. K. Wang, and J. Fang, “A survey on cyber attacks against nonlinear state estimation in power systems of ubiquitous cities,” Pervasive and Mobile Computing, vol. 39, pp. 52–64, 2017. View at Publisher · View at Google Scholar
  6. L. Liu, M. Esmalifalak, Q. Ding, V. A. Emesih, and Z. Han, “Detecting false data injection attacks on power grid by sparse optimization,” IEEE Transactions on Smart Grid, vol. 5, no. 2, pp. 612–621, 2014. View at Publisher · View at Google Scholar · View at Scopus
  7. Q. Hu, D. Fooladivanda, Y. H. Chang, and C. J. Tomlin, “Secure state estimation and control for cyber security of the nonlinear power systems,” 2016, https://arxiv.org/abs/1603.06894.
  8. D. Han, Y. Mo, and L. Xie, “Robust state estimation against sparse integrity attacks,” 2016, https://arxiv.org/abs/1601.04180.
  9. T. T. Kim and H. V. Poor, “Strategic protection against data injection attacks on power grids,” IEEE Transactions on Smart Grid, vol. 2, no. 2, pp. 326–333, 2011. View at Publisher · View at Google Scholar · View at Scopus
  10. J. Wang, W. Tu, L. C. K. Hui, S. M. Yiu, and E. K. Wang, “Detecting time synchronization attacks in cyber-physical systems with machine learning techniques,” in Proceedings of the In 37th IEEE International Conference on Distributed Computing Systems (ICDCS '17), 2017.
  11. G. Hug and J. A. Giampapa, “Vulnerability assessment of AC state estimation with respect to false data injection cyber-attacks,” IEEE Transactions on Smart Grid, vol. 3, no. 3, pp. 1362–1370, 2012. View at Publisher · View at Google Scholar · View at Scopus
  12. G. Chaojun, P. Jirutitijaroen, and M. Motani, “Detecting False Data Injection Attacks in AC State Estimation,” IEEE Transactions on Smart Grid, 2015. View at Publisher · View at Google Scholar · View at Scopus
  13. L. Demanet and X. Zhang, “Eventual linear convergence of the Douglas-Rachford iteration for basis pursuit,” Mathematics of Computation, vol. 85, no. 297, pp. 209–238, 2016. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  14. A. Abur and A. G. Exposito, Power System State Estimation: Theory and Implementation, CRC Press, Boca Raton, Fla, USA, 2004.
  15. J. Wang, L. C. K. Hui, and S. M. Yiu, “Data framing attacks against nonlinear state estimation in smart grid,” in Proceedings of the IEEE Global Communications Conference Workshop (GLOBECOM '15), 2015.
  16. C. R. Goodall, 13 Computation Using The QR Decomposition, Handbook of Statistics, 1993.
  17. E. J. Candes and T. Tao, “Decoding by linear programming,” Institute of Electrical and Electronics Engineers. Transactions on Information Theory, vol. 51, no. 12, pp. 4203–4215, 2005. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  18. J. Zhang, C. Zhao, D. Zhao, and W. Gao, “Image compressive sensing recovery using adaptively learned sparsifying basis via L0 minimization,” Signal Processing, vol. 103, pp. 114–126, 2014. View at Publisher · View at Google Scholar · View at Scopus
  19. Y. Sharon, J. Wright, and Y. Ma, “Computation and relaxation of conditions for equivalence between l1 and l0 minimization,” Tech. Rep. UILU-ENG-07-2208, University of Illinois, Urbana-Champaign, Illinois, Ill, USA, 2007. View at Google Scholar
  20. S. K. M. Kodsi and C. A. Canizares, “Modeling and simulation of ieee 14 bus system with facts controllers,” Tech. Rep., University of Waterloo, Waterloo, Ontario, Canada, 2003. View at Google Scholar
  21. R. D. Zimmerman, C. E. Murillo-Sánchez, and R. J. Thomas, “MATPOWER: steady-state operations, planning, and analysis tools for power systems research and education,” IEEE Transactions on Power Systems, vol. 26, no. 1, pp. 12–19, 2011. View at Publisher · View at Google Scholar · View at Scopus