skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.
Attention:The NSF Public Access Repository (NSF-PAR) system and access will be unavailable from 7:00 AM ET to 7:30 AM ET on Friday, April 24 due to maintenance. We apologize for the inconvenience.


Search for: All records

Award ID contains: 1947617

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. The vulnerabilities of information and communica-tion technology (ICT) infrastructures leave room for cyber attacks threatening the reliable operations of power systems. Based on the real-world evidence of the Ukraine power grid attack and the pop-ular technical discussion that cyber attacks could be launched at the control-center level, this paper reveals a new attack strategy: model-measurement data integrity (MMI) attack. Instead of com-promising measurements only, we investigate the possibility where network parameters are coordinately manipulated when con-structing false data injection attack (FDIA) vectors. Furthermore, we model cyber adversaries possible behavior of co-planning the manipulated measurement channels and parameter attack vectors prior to the launch of FDIAs. The revealed MMI attack strategy allows a drastic reduction of measurement channels to compro-mise in run-time for keeping the stealth property. Simulations in the IEEE 14-bus test system and the IEEE 118-bus test system demonstrate the feasibility of the revealed MMI attack strategy. 
    more » « less
  2. null (Ed.)
  3. null (Ed.)
  4. null (Ed.)