SlideShare a Scribd company logo
1 of 6
GLOBALSOFT TECHNOLOGIES 
IEEE PROJECTS & SOFTWARE DEVELOPMENTS 
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE 
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS 
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com 
On False Data-Injection Attacks against Power System State 
Estimation: Modeling and Countermeasures 
ABSTRACT: 
It is critical for a power system to estimate its operation state based on meter 
measurements in the field and the configuration of power grid networks. Recent 
studies show that the adversary can bypass the existing bad data detection 
schemes,posing dangerous threats to the operation of power grid systems. 
Nevertheless, two critical issues remain open: 1) how can an adversary choose the 
meters to compromise to cause the most significant deviation of the system state 
estimation, and 2) how can a system operator defend against such attacks? To 
address these issues, we first study the problem of finding the optimal attack 
strategy—i.e., a data-injection attacking strategy that selects a set of meters to 
manipulate so as to cause the maximum damage. We formalize the problem and 
develop efficient algorithms to identify the optimal meter set. We implement and 
test our attack strategy on various IEEE standard bus systems, and demonstrate its 
superiority over a baseline strategy of random selections. To defend agains t false 
data-injection attacks, we propose a protection-based defense and a detection-based 
defense, respectively. For the protection-based defense, we identify and
protect critical sensors and make the system more resilient to attacks. For the 
detection-based defense, we develop the spatial-based and temporal-based 
detection schemes to accurately identify data-injection attacks. 
EXISTING SYSTEM: 
State estimation has been widely used by Energy Management Systems (EMS) at 
the control center to ensure that the power grid is running in desired states. It 
provides the estimation of system states in real time based on meter measurements 
in the field. The meter measurements are collected by the Supervisory Control and 
Data Acquisition (SCADA) Systems and processed by a state estimator to filter the 
measurement noise and to detect gross errors. The results of state estimation are 
then used by applications at the control center, for purposes such as contingency 
analysis, optimal power flow, economic dispatch, and others. 
One can see that state estimation plays a critical role in the stability of power grid 
systems. Meter measurements collected via the SCADA system contain not only 
measurement noise due to the finite accuracy of meters and communication media, 
but also errors caused by various issues for example, meters with faulty connection 
and calibration. 
To reduce the impact of noise and errors, power system researchers have 
developed numerous methods to process meter measurements after the state 
estimation process. The essential goal of these methods is to leverage the 
redundancy of multiple measurements to identify and remove anomalies. While 
most existing techniques for protecting power grid systems were designed to 
ensure system reliability (i.e.,against random failures), recently there have been
growing concerns in smart grid initiatives on the protection against malicious cyber 
attacks . There are growing concerns in the smart grid on protection against 
malicious cyber threats and the operation and control of smart grid depend on a 
complex cyberspace of computers, software, and communication technologies. 
Because the measurement component supported by smart equipment (e.g., smart 
meters and sensors) plays an important role, it can be a target for attacks. As those 
measuring devices may be connected through open network interfaces and lacking 
tamper-resistance hardware increases the possibility of being compromised by the 
adversary. 
DISADVANTAGES OF EXISTING SYSTEM: 
1. The adversary can inject false measurement reports to the controller. This 
causes the controller to estimate wrong system states, posing dangerous threats to 
the operation of the power grid system. 
2. If the controller to estimates wrong system states, posing dangerous threats to 
the operation of the power grid system. 
PROPOSED SYSTEM: 
In this paper, we study a novel problem of defending against false data-injection 
attacks from the system operator’s point of view. Because most adversaries are 
limited in the amount of resources they possess, we first consider a least-effort 
attack model—i.e., the objective of the adversary is to identify the minimum 
number of meters that one has to manipulate to change a predetermined number of 
state variables (so as to launch a false data-injection attack accordingly).
We prove the NP-hardness of this problem by reduction from the minimum sub 
additive join problem. To address this problem in a practical setting, we develop a 
linear transformation-based approach, which finds the optimal solution through the 
matrix transformation. Nevertheless, the computation complexity of the matrix 
transformation grows exponentially with the size of the power network. To address 
this issue, we develop a heuristic yet extremely efficient approach. Specifically, 
through the analysis of the H matrix, for a set of bus state variables, the adversary 
needs to compromise less meters when the buses are connected to one another with 
the largest degrees and connected to the least number of buses beyond its area. 
Based on this insight, we divide the network into a number of overlapping areas. 
The linear transformation or brute-force search (BF) can be used to identify the 
optimal set of meters for individual small areas and then derive the set of meters 
for the whole network. 
We have implemented our proposed heuristic-based approach on power system 
state manipulation on various IEEE standard buses. Our extensive experimental 
data validate the feasibility and effectiveness of the developed approach. 
ADVANTAGES OF PROPOSED SYSTEM: 
1. The spatial-based detection algorithm is able to recognize at least 95 percent of 
the false data-injection attacks once the attack changes more than 6 percent of the 
state variable values 
2. The temporal-based detection algorithm can identify the compromised meters 
that send manipulated measurements quickly.
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
 System : Pentium IV 2.4 GHz. 
 Hard Disk : 40 GB. 
 Floppy Drive : 1.44 Mb. 
 Monitor : 15 VGA Colour. 
 Mouse : Logitech. 
 Ram : 512 Mb. 
SOFTWARE REQUIREMENTS: 
 Operating system : Windows XP/7. 
 Coding Language : JAVA/J2EE 
 IDE : Netbeans 7.4 
 Database : MYSQL 
REFERENCE:
Qingyu Yang, Member, IEEE, Jie Yang, Wei Yu, Dou An,Nan Zhang, and Wei 
Zhao, Fellow, IEEE”On False Data-Injection Attacks against Power System 
State Estimation: Modeling and Countermeasures”IEEE TRANSACTIONS 
ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 25,NO. 3,MARCH 
2014.

More Related Content

What's hot

Model based , real time control
Model based , real time controlModel based , real time control
Model based , real time control
anandaxlr8
 
Multisensor data fusion for defense application
Multisensor data fusion for defense applicationMultisensor data fusion for defense application
Multisensor data fusion for defense application
Sayed Abulhasan Quadri
 
Real-Time Simulation for MBSE of Synchrophasor Systems
Real-Time Simulation for MBSE of Synchrophasor SystemsReal-Time Simulation for MBSE of Synchrophasor Systems
Real-Time Simulation for MBSE of Synchrophasor Systems
Luigi Vanfretti
 

What's hot (18)

A SECURITY PERIOD UPDATE METHOD USING EVALUATION FUNCTION FOR IMPROVING ENERG...
A SECURITY PERIOD UPDATE METHOD USING EVALUATION FUNCTION FOR IMPROVING ENERG...A SECURITY PERIOD UPDATE METHOD USING EVALUATION FUNCTION FOR IMPROVING ENERG...
A SECURITY PERIOD UPDATE METHOD USING EVALUATION FUNCTION FOR IMPROVING ENERG...
 
Who Monitors the Monitors? Automated, Hierarchical Data Quality Assessment fo...
Who Monitors the Monitors? Automated, Hierarchical Data Quality Assessment fo...Who Monitors the Monitors? Automated, Hierarchical Data Quality Assessment fo...
Who Monitors the Monitors? Automated, Hierarchical Data Quality Assessment fo...
 
ppt-HUNGARY
ppt-HUNGARYppt-HUNGARY
ppt-HUNGARY
 
Model based , real time control
Model based , real time controlModel based , real time control
Model based , real time control
 
Artificial Intelligence techniques
Artificial Intelligence techniquesArtificial Intelligence techniques
Artificial Intelligence techniques
 
Multisensor data fusion for defense application
Multisensor data fusion for defense applicationMultisensor data fusion for defense application
Multisensor data fusion for defense application
 
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...
 
A Survey of Fault Tolerance Methods in Wireless Sensor Networks
A Survey of Fault Tolerance Methods in Wireless Sensor NetworksA Survey of Fault Tolerance Methods in Wireless Sensor Networks
A Survey of Fault Tolerance Methods in Wireless Sensor Networks
 
Artifical intelligence
Artifical intelligenceArtifical intelligence
Artifical intelligence
 
58
5858
58
 
Research on Power Quality Real-Time Monitoring System For High Voltage Switch...
Research on Power Quality Real-Time Monitoring System For High Voltage Switch...Research on Power Quality Real-Time Monitoring System For High Voltage Switch...
Research on Power Quality Real-Time Monitoring System For High Voltage Switch...
 
What is a Precision Engineering
What is a Precision EngineeringWhat is a Precision Engineering
What is a Precision Engineering
 
Artificial intelligence in power system
Artificial intelligence in power systemArtificial intelligence in power system
Artificial intelligence in power system
 
Study of Cyber-Security on Load Frequency Control in Power System
Study of Cyber-Security on Load Frequency Control in Power SystemStudy of Cyber-Security on Load Frequency Control in Power System
Study of Cyber-Security on Load Frequency Control in Power System
 
SOHOMA19 Conference slides
SOHOMA19 Conference slidesSOHOMA19 Conference slides
SOHOMA19 Conference slides
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsn
 
Real-Time Simulation for MBSE of Synchrophasor Systems
Real-Time Simulation for MBSE of Synchrophasor SystemsReal-Time Simulation for MBSE of Synchrophasor Systems
Real-Time Simulation for MBSE of Synchrophasor Systems
 
Artificial neural network for misuse detection
Artificial neural network for misuse detectionArtificial neural network for misuse detection
Artificial neural network for misuse detection
 

Viewers also liked

05 boleti nespecial05buletina2014
05 boleti nespecial05buletina201405 boleti nespecial05buletina2014
05 boleti nespecial05buletina2014
AFMENICA
 
Naveen Narayan CV final
Naveen Narayan CV finalNaveen Narayan CV final
Naveen Narayan CV final
Naveen Narayan
 

Viewers also liked (16)

Research and planning organisation & target audience
Research and planning organisation & target audience Research and planning organisation & target audience
Research and planning organisation & target audience
 
Trabajo final curso herramientas,recursos y estrategias para profesores
Trabajo final curso herramientas,recursos y estrategias para profesoresTrabajo final curso herramientas,recursos y estrategias para profesores
Trabajo final curso herramientas,recursos y estrategias para profesores
 
Tt 16413 btc
Tt 16413 btcTt 16413 btc
Tt 16413 btc
 
05 boleti nespecial05buletina2014
05 boleti nespecial05buletina201405 boleti nespecial05buletina2014
05 boleti nespecial05buletina2014
 
Big Data Event - Pittsburgh Oct. 15
Big Data Event - Pittsburgh Oct. 15 Big Data Event - Pittsburgh Oct. 15
Big Data Event - Pittsburgh Oct. 15
 
Storm thorgerson
Storm thorgersonStorm thorgerson
Storm thorgerson
 
Jornada saludable
Jornada saludableJornada saludable
Jornada saludable
 
Bases clag media_talent_gal
Bases clag media_talent_galBases clag media_talent_gal
Bases clag media_talent_gal
 
Final product
Final productFinal product
Final product
 
督視人研考會交流 20150616
督視人研考會交流 20150616督視人研考會交流 20150616
督視人研考會交流 20150616
 
Customer behaviour for Food & Beverages Assessment
Customer behaviour for Food & Beverages AssessmentCustomer behaviour for Food & Beverages Assessment
Customer behaviour for Food & Beverages Assessment
 
EOG Resources 4Q 2015 Quarterly Presentation Investor Relations
EOG Resources 4Q 2015 Quarterly Presentation Investor RelationsEOG Resources 4Q 2015 Quarterly Presentation Investor Relations
EOG Resources 4Q 2015 Quarterly Presentation Investor Relations
 
«Якби Рей Бредбері був юристом: сьогодні і завтра юридичної думки в українськ...
«Якби Рей Бредбері був юристом: сьогодні і завтра юридичної думки в українськ...«Якби Рей Бредбері був юристом: сьогодні і завтра юридичної думки в українськ...
«Якби Рей Бредбері був юристом: сьогодні і завтра юридичної думки в українськ...
 
Locating Assets in your Warehouse - A solution for Logistics created by Onyx ...
Locating Assets in your Warehouse - A solution for Logistics created by Onyx ...Locating Assets in your Warehouse - A solution for Logistics created by Onyx ...
Locating Assets in your Warehouse - A solution for Logistics created by Onyx ...
 
Gran cena bailable
Gran cena bailableGran cena bailable
Gran cena bailable
 
Naveen Narayan CV final
Naveen Narayan CV finalNaveen Narayan CV final
Naveen Narayan CV final
 

Similar to 2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-against-power

An intrusion detection algorithm for ami
An intrusion detection algorithm for amiAn intrusion detection algorithm for ami
An intrusion detection algorithm for ami
IJCI JOURNAL
 
International Journal of Engineering (IJE) Volume (3) Issue (1)
International Journal of Engineering (IJE) Volume (3)  Issue (1)International Journal of Engineering (IJE) Volume (3)  Issue (1)
International Journal of Engineering (IJE) Volume (3) Issue (1)
CSCJournals
 
Fault diagnosis of a high voltage transmission line using waveform matching a...
Fault diagnosis of a high voltage transmission line using waveform matching a...Fault diagnosis of a high voltage transmission line using waveform matching a...
Fault diagnosis of a high voltage transmission line using waveform matching a...
ijsc
 
Fault Diagnosis of a High Voltage Transmission Line Using Waveform Matching A...
Fault Diagnosis of a High Voltage Transmission Line Using Waveform Matching A...Fault Diagnosis of a High Voltage Transmission Line Using Waveform Matching A...
Fault Diagnosis of a High Voltage Transmission Line Using Waveform Matching A...
ijsc
 
A_Novel_Standalone_Implementation_of_MDNN_Controller_for_DC-DC_Converter_Resi...
A_Novel_Standalone_Implementation_of_MDNN_Controller_for_DC-DC_Converter_Resi...A_Novel_Standalone_Implementation_of_MDNN_Controller_for_DC-DC_Converter_Resi...
A_Novel_Standalone_Implementation_of_MDNN_Controller_for_DC-DC_Converter_Resi...
lvskumar1
 
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
ijsrd.com
 

Similar to 2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-against-power (20)

on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...
 
Irjet v7 i3475
Irjet v7 i3475Irjet v7 i3475
Irjet v7 i3475
 
An intrusion detection algorithm for ami
An intrusion detection algorithm for amiAn intrusion detection algorithm for ami
An intrusion detection algorithm for ami
 
Safeguard the Automatic Generation Control using Game Theory Technique
Safeguard the Automatic Generation Control using Game Theory TechniqueSafeguard the Automatic Generation Control using Game Theory Technique
Safeguard the Automatic Generation Control using Game Theory Technique
 
IRJET- False Data Injection Attacks in Insider Attack
IRJET-  	  False Data Injection Attacks in Insider AttackIRJET-  	  False Data Injection Attacks in Insider Attack
IRJET- False Data Injection Attacks in Insider Attack
 
A robust algorithm based on a failure sensitive matrix for fault diagnosis of...
A robust algorithm based on a failure sensitive matrix for fault diagnosis of...A robust algorithm based on a failure sensitive matrix for fault diagnosis of...
A robust algorithm based on a failure sensitive matrix for fault diagnosis of...
 
2014 IEEE JAVA NETWORK SECURITY PROJECT Integrated security analysis on casca...
2014 IEEE JAVA NETWORK SECURITY PROJECT Integrated security analysis on casca...2014 IEEE JAVA NETWORK SECURITY PROJECT Integrated security analysis on casca...
2014 IEEE JAVA NETWORK SECURITY PROJECT Integrated security analysis on casca...
 
2014 IEEE JAVA NETWORK SECURITY PROJECT Integrated security analysis on casca...
2014 IEEE JAVA NETWORK SECURITY PROJECT Integrated security analysis on casca...2014 IEEE JAVA NETWORK SECURITY PROJECT Integrated security analysis on casca...
2014 IEEE JAVA NETWORK SECURITY PROJECT Integrated security analysis on casca...
 
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Integrated security analysis on casc...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Integrated security analysis on casc...IEEE 2014 JAVA NETWORK SECURITY PROJECTS Integrated security analysis on casc...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Integrated security analysis on casc...
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
 
International Journal of Engineering (IJE) Volume (3) Issue (1)
International Journal of Engineering (IJE) Volume (3)  Issue (1)International Journal of Engineering (IJE) Volume (3)  Issue (1)
International Journal of Engineering (IJE) Volume (3) Issue (1)
 
Cyber-Defensive Architecture for Networked Industrial Control Systems
Cyber-Defensive Architecture for Networked Industrial Control SystemsCyber-Defensive Architecture for Networked Industrial Control Systems
Cyber-Defensive Architecture for Networked Industrial Control Systems
 
Fault diagnosis of a high voltage transmission line using waveform matching a...
Fault diagnosis of a high voltage transmission line using waveform matching a...Fault diagnosis of a high voltage transmission line using waveform matching a...
Fault diagnosis of a high voltage transmission line using waveform matching a...
 
FUZZY LOGIC APPROACH FOR FAULT DIAGNOSIS OF THREE PHASE TRANSMISSION LINE
FUZZY LOGIC APPROACH FOR FAULT DIAGNOSIS OF THREE PHASE TRANSMISSION LINEFUZZY LOGIC APPROACH FOR FAULT DIAGNOSIS OF THREE PHASE TRANSMISSION LINE
FUZZY LOGIC APPROACH FOR FAULT DIAGNOSIS OF THREE PHASE TRANSMISSION LINE
 
IEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and AbstractIEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and Abstract
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
IRJET-Electrical Power Robbery Detection and Transformer Fault Detection
IRJET-Electrical Power Robbery Detection and Transformer Fault Detection  IRJET-Electrical Power Robbery Detection and Transformer Fault Detection
IRJET-Electrical Power Robbery Detection and Transformer Fault Detection
 
Fault Diagnosis of a High Voltage Transmission Line Using Waveform Matching A...
Fault Diagnosis of a High Voltage Transmission Line Using Waveform Matching A...Fault Diagnosis of a High Voltage Transmission Line Using Waveform Matching A...
Fault Diagnosis of a High Voltage Transmission Line Using Waveform Matching A...
 
A_Novel_Standalone_Implementation_of_MDNN_Controller_for_DC-DC_Converter_Resi...
A_Novel_Standalone_Implementation_of_MDNN_Controller_for_DC-DC_Converter_Resi...A_Novel_Standalone_Implementation_of_MDNN_Controller_for_DC-DC_Converter_Resi...
A_Novel_Standalone_Implementation_of_MDNN_Controller_for_DC-DC_Converter_Resi...
 
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
 

More from IEEEGLOBALSOFTSTUDENTSPROJECTS

More from IEEEGLOBALSOFTSTUDENTSPROJECTS (20)

2014 2015 ieee dotnet projects globalsoft technologies
2014 2015 ieee dotnet projects globalsoft technologies2014 2015 ieee dotnet projects globalsoft technologies
2014 2015 ieee dotnet projects globalsoft technologies
 
2014 2015 ieee java projects globalsoft technologies
2014 2015 ieee java projects globalsoft technologies2014 2015 ieee java projects globalsoft technologies
2014 2015 ieee java projects globalsoft technologies
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Signature searching in a networ...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Signature searching in a networ...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Signature searching in a networ...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Signature searching in a networ...
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT On social delay tolerant networ...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT On social delay tolerant networ...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT On social delay tolerant networ...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT On social delay tolerant networ...
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Multicast capacity-in-manet-wit...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Multicast capacity-in-manet-wit...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Multicast capacity-in-manet-wit...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Multicast capacity-in-manet-wit...
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Efficient data-query-in-intermi...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Efficient data-query-in-intermi...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Efficient data-query-in-intermi...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Efficient data-query-in-intermi...
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Trajectory improves data delivery...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Trajectory improves data delivery...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Trajectory improves data delivery...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Trajectory improves data delivery...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Tracon interference aware schedul...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Tracon interference aware schedul...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Tracon interference aware schedul...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Tracon interference aware schedul...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The design-and-evaluation-of-an-i...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The design-and-evaluation-of-an-i...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The design-and-evaluation-of-an-i...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The design-and-evaluation-of-an-i...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The client assignment problem for...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The client assignment problem for...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The client assignment problem for...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The client assignment problem for...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Streaming applications on bus bas...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Streaming applications on bus bas...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Streaming applications on bus bas...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Streaming applications on bus bas...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Securing brokerless publish subsc...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Securing brokerless publish subsc...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Securing brokerless publish subsc...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Securing brokerless publish subsc...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Secure outsourced-attribute-based...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Secure outsourced-attribute-based...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Secure outsourced-attribute-based...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Secure outsourced-attribute-based...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Rre a-game-theoretic-intrusion-re...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Rre a-game-theoretic-intrusion-re...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Rre a-game-theoretic-intrusion-re...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Rre a-game-theoretic-intrusion-re...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Peer assisted vod systems an effi...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Peer assisted vod systems an effi...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Peer assisted vod systems an effi...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Peer assisted vod systems an effi...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On social delay tolerant networki...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On social delay tolerant networki...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On social delay tolerant networki...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On social delay tolerant networki...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Constructing load balanced data a...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Constructing load balanced data a...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Constructing load balanced data a...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Constructing load balanced data a...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT An ontology based hybrid approach...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT An ontology based hybrid approach...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT An ontology based hybrid approach...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT An ontology based hybrid approach...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT A security and privacy aware loca...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT A security and privacy aware loca...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT A security and privacy aware loca...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT A security and privacy aware loca...
 

Recently uploaded

"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
chumtiyababu
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 

Recently uploaded (20)

Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 

2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-against-power

  • 1. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures ABSTRACT: It is critical for a power system to estimate its operation state based on meter measurements in the field and the configuration of power grid networks. Recent studies show that the adversary can bypass the existing bad data detection schemes,posing dangerous threats to the operation of power grid systems. Nevertheless, two critical issues remain open: 1) how can an adversary choose the meters to compromise to cause the most significant deviation of the system state estimation, and 2) how can a system operator defend against such attacks? To address these issues, we first study the problem of finding the optimal attack strategy—i.e., a data-injection attacking strategy that selects a set of meters to manipulate so as to cause the maximum damage. We formalize the problem and develop efficient algorithms to identify the optimal meter set. We implement and test our attack strategy on various IEEE standard bus systems, and demonstrate its superiority over a baseline strategy of random selections. To defend agains t false data-injection attacks, we propose a protection-based defense and a detection-based defense, respectively. For the protection-based defense, we identify and
  • 2. protect critical sensors and make the system more resilient to attacks. For the detection-based defense, we develop the spatial-based and temporal-based detection schemes to accurately identify data-injection attacks. EXISTING SYSTEM: State estimation has been widely used by Energy Management Systems (EMS) at the control center to ensure that the power grid is running in desired states. It provides the estimation of system states in real time based on meter measurements in the field. The meter measurements are collected by the Supervisory Control and Data Acquisition (SCADA) Systems and processed by a state estimator to filter the measurement noise and to detect gross errors. The results of state estimation are then used by applications at the control center, for purposes such as contingency analysis, optimal power flow, economic dispatch, and others. One can see that state estimation plays a critical role in the stability of power grid systems. Meter measurements collected via the SCADA system contain not only measurement noise due to the finite accuracy of meters and communication media, but also errors caused by various issues for example, meters with faulty connection and calibration. To reduce the impact of noise and errors, power system researchers have developed numerous methods to process meter measurements after the state estimation process. The essential goal of these methods is to leverage the redundancy of multiple measurements to identify and remove anomalies. While most existing techniques for protecting power grid systems were designed to ensure system reliability (i.e.,against random failures), recently there have been
  • 3. growing concerns in smart grid initiatives on the protection against malicious cyber attacks . There are growing concerns in the smart grid on protection against malicious cyber threats and the operation and control of smart grid depend on a complex cyberspace of computers, software, and communication technologies. Because the measurement component supported by smart equipment (e.g., smart meters and sensors) plays an important role, it can be a target for attacks. As those measuring devices may be connected through open network interfaces and lacking tamper-resistance hardware increases the possibility of being compromised by the adversary. DISADVANTAGES OF EXISTING SYSTEM: 1. The adversary can inject false measurement reports to the controller. This causes the controller to estimate wrong system states, posing dangerous threats to the operation of the power grid system. 2. If the controller to estimates wrong system states, posing dangerous threats to the operation of the power grid system. PROPOSED SYSTEM: In this paper, we study a novel problem of defending against false data-injection attacks from the system operator’s point of view. Because most adversaries are limited in the amount of resources they possess, we first consider a least-effort attack model—i.e., the objective of the adversary is to identify the minimum number of meters that one has to manipulate to change a predetermined number of state variables (so as to launch a false data-injection attack accordingly).
  • 4. We prove the NP-hardness of this problem by reduction from the minimum sub additive join problem. To address this problem in a practical setting, we develop a linear transformation-based approach, which finds the optimal solution through the matrix transformation. Nevertheless, the computation complexity of the matrix transformation grows exponentially with the size of the power network. To address this issue, we develop a heuristic yet extremely efficient approach. Specifically, through the analysis of the H matrix, for a set of bus state variables, the adversary needs to compromise less meters when the buses are connected to one another with the largest degrees and connected to the least number of buses beyond its area. Based on this insight, we divide the network into a number of overlapping areas. The linear transformation or brute-force search (BF) can be used to identify the optimal set of meters for individual small areas and then derive the set of meters for the whole network. We have implemented our proposed heuristic-based approach on power system state manipulation on various IEEE standard buses. Our extensive experimental data validate the feasibility and effectiveness of the developed approach. ADVANTAGES OF PROPOSED SYSTEM: 1. The spatial-based detection algorithm is able to recognize at least 95 percent of the false data-injection attacks once the attack changes more than 6 percent of the state variable values 2. The temporal-based detection algorithm can identify the compromised meters that send manipulated measurements quickly.
  • 5. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : JAVA/J2EE  IDE : Netbeans 7.4  Database : MYSQL REFERENCE:
  • 6. Qingyu Yang, Member, IEEE, Jie Yang, Wei Yu, Dou An,Nan Zhang, and Wei Zhao, Fellow, IEEE”On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures”IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 25,NO. 3,MARCH 2014.