Smarter security in the smart grid

Mete Ozay, Inaki Esnaola, Fatos T. Yarman Vural, Sanjeev R. Kulkarni, H. Vincent Poor

Research output: Chapter in Book/Report/Conference proceedingConference contribution

16 Scopus citations

Abstract

A new formulation for detection of false data injection attacks in the smart grid is introduced. The attack detection problem is posed as a statistical learning problem in which the observed measurements are classified as being either attacked or secure. The proposed approach provides an attack detection framework that surmounts over the constraints arising due to the sparse structure of the problem and implicitly exploits any available prior knowledge about the system. Specifically, three supervised learning algorithms are presented. These procedures operate by first observing the power system in order to construct a training dataset which is later used to detect the attacks in new observations. In order to assess the validity of the proposed techniques, the behavior of the proposed algorithms is examined on IEEE test systems.

Original languageEnglish (US)
Title of host publication2012 IEEE 3rd International Conference on Smart Grid Communications, SmartGridComm 2012
Pages312-317
Number of pages6
DOIs
StatePublished - 2012
Event2012 IEEE 3rd International Conference on Smart Grid Communications, SmartGridComm 2012 - Tainan, Taiwan, Province of China
Duration: Nov 5 2012Nov 8 2012

Publication series

Name2012 IEEE 3rd International Conference on Smart Grid Communications, SmartGridComm 2012

Other

Other2012 IEEE 3rd International Conference on Smart Grid Communications, SmartGridComm 2012
Country/TerritoryTaiwan, Province of China
CityTainan
Period11/5/1211/8/12

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Communication

Keywords

  • Smart grid security
  • attack detection
  • classification
  • convex optimization
  • machine learning

Fingerprint

Dive into the research topics of 'Smarter security in the smart grid'. Together they form a unique fingerprint.

Cite this