{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T21:22:37Z","timestamp":1776288157926,"version":"3.50.1"},"reference-count":46,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2011,5,1]],"date-time":"2011-05-01T00:00:00Z","timestamp":1304208000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-0831302CAREER-0447761"],"award-info":[{"award-number":["CNS-0831302CAREER-0447761"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-0831302CAREER-0447761"],"award-info":[{"award-number":["CNS-0831302CAREER-0447761"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Inf. Syst. Secur."],"published-print":{"date-parts":[[2011,5]]},"abstract":"<jats:p>\n            A power grid is a complex system connecting electric power generators to consumers through power transmission and distribution networks across a large geographical area. System monitoring is necessary to ensure the reliable operation of power grids, and\n            <jats:italic>state estimation<\/jats:italic>\n            is used in system monitoring to best estimate the power grid state through analysis of meter measurements and power system models. Various techniques have been developed to detect and identify bad measurements, including\n            <jats:italic>interacting bad measurements<\/jats:italic>\n            introduced by\n            <jats:italic>arbitrary, nonrandom<\/jats:italic>\n            causes. At first glance, it seems that these techniques can also defeat malicious measurements injected by attackers.\n          <\/jats:p>\n          <jats:p>\n            In this article, we expose an unknown vulnerability of existing bad measurement detection algorithms by presenting and analyzing a new class of attacks, called\n            <jats:italic>false data injection attacks<\/jats:italic>\n            , against state estimation in electric power grids. Under the assumption that the attacker can access the current power system configuration information and manipulate the measurements of meters at physically protected locations such as substations, such attacks can introduce\n            <jats:italic>arbitrary<\/jats:italic>\n            errors into certain state variables without being detected by existing algorithms. Moreover, we look at two scenarios, where the attacker is either constrained to specific meters or limited in the resources required to compromise meters. We show that the attacker can systematically and efficiently construct attack vectors in both scenarios to change the results of state estimation in\n            <jats:italic>arbitrary<\/jats:italic>\n            ways. We also extend these attacks to\n            <jats:italic>generalized false data injection attacks<\/jats:italic>\n            , which can further increase the impact by exploiting measurement errors typically tolerated in state estimation. We demonstrate the success of these attacks through simulation using IEEE test systems, and also discuss the practicality of these attacks and the real-world constraints that limit their effectiveness.\n          <\/jats:p>","DOI":"10.1145\/1952982.1952995","type":"journal-article","created":{"date-parts":[[2011,6,6]],"date-time":"2011-06-06T11:51:38Z","timestamp":1307361098000},"page":"1-33","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1908,"title":["False data injection attacks against state estimation in electric power grids"],"prefix":"10.1145","volume":"14","author":[{"given":"Yao","family":"Liu","sequence":"first","affiliation":[{"name":"North Carolina State University"}]},{"given":"Peng","family":"Ning","sequence":"additional","affiliation":[{"name":"North Carolina State University"}]},{"given":"Michael K.","family":"Reiter","sequence":"additional","affiliation":[{"name":"University of North Carolina at Chapel Hill"}]}],"member":"320","published-online":{"date-parts":[[2011,6,6]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Abur A. and Exp\u00f3sito A. G. 2004. Power System State Estimation: Theory and Implementation. Marcel Dekker.  Abur A. and Exp\u00f3sito A. G. 2004. Power System State Estimation: Theory and Implementation. Marcel Dekker.","DOI":"10.1201\/9780203913673"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(97)00115-1"},{"key":"e_1_2_1_3_1","volume-title":"Proceedings of the IEEE Power Engineering Society General Meeting. IEEE","author":"Asada E. N."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2007.916124"},{"key":"e_1_2_1_5_1","volume-title":"Proceedings of the First Workshop on Secure Control Systems (SCS'10)","author":"Bobba R. B."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-0320-4"},{"key":"e_1_2_1_7_1","volume-title":"Proceedings of the IEEE Power Engineering Society General Meeting. IEEE","author":"Chen J."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2006.881149"},{"key":"e_1_2_1_10_1","unstructured":"Christie R. D. 1999. Power systems test case archive. http:\/\/www.ee.washington.edu\/research\/pstca\/.  Christie R. D. 1999. Power systems test case archive. http:\/\/www.ee.washington.edu\/research\/pstca\/."},{"key":"e_1_2_1_11_1","doi-asserted-by":"crossref","unstructured":"D\u00e1n G. and Sandberg H. 2010. Stealth attacks and protection schemes for state estimators in power systems. In IEEE 2010 SmartGridComm. To appear.  D\u00e1n G. and Sandberg H. 2010. Stealth attacks and protection schemes for state estimators in power systems. In IEEE 2010 SmartGridComm. To appear.","DOI":"10.1109\/SMARTGRID.2010.5622046"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAS.1979.319482"},{"key":"e_1_2_1_13_1","unstructured":"Garey M. R. and Johnson D. S. 1979. Computer and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman.   Garey M. R. and Johnson D. S. 1979. Computer and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman."},{"key":"e_1_2_1_14_1","volume-title":"Proceedings of the IEEE Power Tech Conference. IEEE","author":"Gastoni S."},{"key":"e_1_2_1_15_1","volume-title":"Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS'04)","author":"Georgiev P."},{"key":"e_1_2_1_16_1","volume-title":"Matrix Computation","author":"Golub G. H.","edition":"2"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/T-PAS.1975.31858"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1049\/cp:20060013"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2007.894287"},{"key":"e_1_2_1_20_1","volume-title":"Proceedings of Conference on Information Sciences and Systems.","author":"Kosut O."},{"key":"e_1_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Kosut O. Jia L. Thomas R. J. and Tong L. 2010b. Malicious data attacks on smart grid state estimation: Attack strategies and countermeasures. In IEEE 2010 SmartGridComm. To appear.  Kosut O. Jia L. Thomas R. J. and Tong L. 2010b. Malicious data attacks on smart grid state estimation: Attack strategies and countermeasures. In IEEE 2010 SmartGridComm. To appear.","DOI":"10.1109\/SMARTGRID.2010.5622045"},{"key":"e_1_2_1_22_1","volume-title":"Proceedings of the 45th International Universities' Power Engineering Conference (UPEC'10)","author":"Kosut O."},{"key":"e_1_2_1_23_1","volume-title":"Proceedings of the Power and Energy Society General Meeting--Conversion and Delivery of Electrical Energy in the 21st Century. 1--8.","author":"Li M."},{"key":"e_1_2_1_24_1","volume-title":"Proceedings of the IEEE Power Engineering Society General Meeting. IEEE","author":"Lin J."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653666"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2005.855400"},{"key":"e_1_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Meyer C. 2001. Matrix Analysis and Applied Linear Algebra. SIAM.   Meyer C. 2001. Matrix Analysis and Applied Linear Algebra. SIAM.","DOI":"10.1137\/1.9780898719512"},{"key":"e_1_2_1_28_1","doi-asserted-by":"crossref","first-page":"3037","DOI":"10.1109\/TPAS.1985.318945","article-title":"Bad data identification methods in power system state estimation, a comparative study","volume":"103","author":"Mili L.","year":"1985","journal-title":"IEEE Trans. Power Appar. Syst."},{"key":"e_1_2_1_29_1","first-page":"3239","article-title":"Hypothesis testing identification: A new method for bad data analysis in power system state estimation","volume":"103","author":"Mili L.","year":"1984","journal-title":"IEEE Trans. Power Appar. Syst."},{"key":"e_1_2_1_30_1","volume-title":"A Generalized Approach","author":"Monticelli A."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAS.1983.318053"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.1986.4308016"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539792240406"},{"key":"e_1_2_1_34_1","unstructured":"National Security Telecommunications Advisory Committee (NSTAC) -- Information Assurance Task Force (IATF). Electric power risk assessment.  National Security Telecommunications Advisory Committee (NSTAC) -- Information Assurance Task Force (IATF). Electric power risk assessment."},{"key":"e_1_2_1_35_1","volume-title":"Proceedings of the 27th Asilomar Conference on Signals, Systems and Computers.","author":"Pati Y. C."},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAS.1982.317595"},{"key":"e_1_2_1_37_1","volume-title":"Proceedings of the 1st Workshop on Secure Control Systems (SCS'10)","author":"Sandberg H."},{"key":"e_1_2_1_38_1","first-page":"2","article-title":"Power system static state estimation","volume":"1","author":"Schweppe F. C.","year":"1970","journal-title":"Parts"},{"key":"e_1_2_1_39_1","volume-title":"Final Report on the","year":"2003"},{"key":"e_1_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Wood A. and Wollenberg B. 1996. Power Generation Operation and Control (2nd ed.) Wiley New York.  Wood A. and Wollenberg B. 1996. Power Generation Operation and Control (2nd ed.) Wiley New York.","DOI":"10.1016\/0140-6701(96)88715-7"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/59.32475"},{"key":"e_1_2_1_42_1","volume-title":"Proceedings of the 7th Power Systems Computation Conference (PSCC). 1061--1065","author":"Xiang N."},{"key":"e_1_2_1_43_1","first-page":"225","article-title":"A new approach for detection and identification of multiple bad data in power system state estimation","volume":"103","author":"Xiang N.","year":"1982","journal-title":"IEEE Trans. Power Appar. Syst."},{"key":"e_1_2_1_44_1","first-page":"225","article-title":"An application of estimation-identification approach of multiple bad data in power system state estimation","volume":"103","author":"Xiang N.","year":"1983","journal-title":"IEEE Trans. Power Appar. Syst."},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2005.846209"},{"key":"e_1_2_1_46_1","volume-title":"Proceedings of the IEEE Power Tech Conference. IEEE","author":"Zhu J."},{"key":"e_1_2_1_47_1","unstructured":"Zimmerman R. D. and Murillo-Sanchez C. E. 2007. MATPOWER A MATLAB power system simulation package. http:\/\/www.pserc.cornell.edu\/matpower\/manual.pdf.  Zimmerman R. D. and Murillo-Sanchez C. E. 2007. MATPOWER A MATLAB power system simulation package. http:\/\/www.pserc.cornell.edu\/matpower\/manual.pdf."}],"container-title":["ACM Transactions on Information and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1952982.1952995","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1952982.1952995","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:59:41Z","timestamp":1750244381000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1952982.1952995"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,5]]},"references-count":46,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,5]]}},"alternative-id":["10.1145\/1952982.1952995"],"URL":"https:\/\/doi.org\/10.1145\/1952982.1952995","relation":{},"ISSN":["1094-9224","1557-7406"],"issn-type":[{"value":"1094-9224","type":"print"},{"value":"1557-7406","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,5]]},"assertion":[{"value":"2010-03-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2011-01-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2011-06-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}