DC microgrids have widely adopted hierarchical control architecture through distributed generation units (DGUs) to enhance reliability and scalability. However, this makes the system vulnerable to false data injection attacks (FDIAs), which can disrupt system stability or shift the operating point. While observers are commonly used to detect FDIAs, some FDIAs can be stealthy, or observers lack sufficient sensitivity for reliable identification. To address this, we propose a quickest change detection (QCD) method based on an unknown input observer (UIO) estimation error model to detect the FDIAs that are stealthy to the UIOs. The Ergodic CuSum algorithm is designed and can be efficiently updated using estimation error observations. The approach is validated through Simulink and real-time simulations.
more »
« less
Automated Discovery of Semantic Attacks in {Multi-Robot} Navigation Systems
Finding collision-free paths is crucial for autonomous multi-robots (AMRs) to complete assigned missions, ranging from search operations to military tasks. To achieve this, AMRs rely on collaborative collision avoidance algorithms. Unfortunately, the robustness of these algorithms against false data injection attacks (FDIAs) remains unexplored. In this paper, we introduce Raven, a tool to identify effective and stealthy semantic attacks (eg, herding). Effective attacks minimize positional displacement and the number of false data injections by using temporal logic and stochastic optimization techniques. Stealthy attacks remain within sensor noise ranges and maintain spatiotemporal consistency. We evaluate Raven against two state-of-the-art collision avoidance algorithms, ORCA and GLAS. Our results show that a single false data injection impacts multi-robot systems by causing position deviation or even collisions. We evaluate Raven on three testbeds–a numerical simulator, a high-fidelity simulator, and Crazyflie drones. Our results reveal five design flaws in these algorithms and underscore the importance of developing robust defenses against FDIAs. Finally, we propose countermeasures to mitigate the attacks we have uncovered.
more »
« less
- Award ID(s):
- 2229876
- PAR ID:
- 10661378
- Publisher / Repository:
- 34th USENIX Security Symposium (USENIX Security 25)
- Date Published:
- Page Range / eLocation ID:
- 3959-3978
- Format(s):
- Medium: X
- Location:
- Seattle, WA
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
Secure vehicular communication is a critical factor for secure traffic management. Effective security in intelligent transportation systems (ITS) requires effective and timely intrusion detection systems (IDS). In this paper, we consider false data injection attacks and distributed denial-of-service (DDoS) attacks, especially the stealthy DDoS attacks, targeting integrity and availability, respectively, in vehicular ad-hoc networks (VANET). Novel machine learning techniques for intrusion detection and mitigation based on centralized communications through roadside units (RSU) are proposed for the considered attacks. The performance of the proposed methods is evaluated using a traffic simulator and a real traffic dataset. Comparisons with the state-of-the-art solutions clearly demonstrate the superior detection and localization performance of the proposed methods by 78% in the best case and 27% in the worst case, while achieving the same level of false alarm probability.more » « less
-
Hidden moving target defense (HMTD) is a proactive defense strategy that is kept hidden from attackers by changing the reactance of transmission lines to thwart false data injection (FDI) attacks. However, alert attackers with strong capabilities pose additional risks to the HMTD and thus, it is much-needed to evaluate the hiddenness of the HMTD. This paper first summarizes two existing alert attacker models, i.e., bad-data-detection-based alert attackers and data-driven alert attackers. Furthermore, this paper proposes a novel model-based alert attacker model that uses the MTD operation models to estimate the dispatched line reactance. The proposed attacker model can use the estimated line reactance to construct stealthy FDI attacks against HMTD methods that lack randomness. We propose a novel random-enabled HMTD (RHMTD) operation method, which utilizes random weights to introduce randomness and uses the derived hiddenness operation conditions as constraints. RHMTD is theoretically proven to be kept hidden from three alert attacker models. In addition, we analyze the detection effectiveness of the RHMTD against three alert attacker models. Simulation results on the IEEE 14-bus systems show that traditional HMTD methods fail to detect attacks by the model-based alert attacker, and RHMTD is kept hidden from three alert attackers and is effective in detecting attacks by three alert attackers.more » « less
-
Not AvailableDC microgrid systems commonly feature a hierarchical control architecture with multiple interconnected distributed generation units (DGUs), requiring the integration of communication layers. This integration introduces a potential vulnerability, as malicious attackers can exploit the system by injecting false data, which could result in a shift in the operating point of the system or make the entire system unstable. To overcome this issue, this article proposes a data-driven unknown input observer (UIO) to detect and identify false data injection attacks (FDIAs) in the system. The data-driven UIOs are designed using only historical input/output data, which can be collected through simulations or experimental results. The developed UIOs do not require knowledge of the microgrid parameters. The proposed data-driven UIOs are then validated through Simulink and hardware-in-the-loop real-time simulation case studies to detect FDIAs in the secondary control of dc microgrids. The results show that the proposed observers can effectively detect and localize FDIAs in the communication links of the system.more » « less
-
The smart grid provides efficient and cost-effective management of the electric energy grid by allowing real-time monitoring, coordinating, and controlling the system using communication networks between physical components. This inherent complexity significantly increases the vulnerabilities and attack surface in the smart grid due to misconfigurations or the lack of security hardening. Therefore, it is important to ensure a secure and resilient operation of the smart grid by proactive identification of potential threats, impact assessment, and cost-efficient mitigation planning. This paper aims to achieve these goals through the development of an efficient security framework for the Energy Management System (EMS), a core smart grid component. In this paper, we present a framework that combines formal analytic with PowerWorld simulator which verifies the solution model to investigate the feasibility of false data injection attacks against contingency analysis in the power grid. We evaluate the impact of such attacks by running experiments using synthetic data on the standard IEEE test cases.more » « less
An official website of the United States government

